FEMA

Exclusive New Court Docs: Oklahoma City Truth is Back! Trentadue's court process unfolds in epic FOIA fight for missing Murrah & motel videotapes

Here is something kind of nifty - just got the latest court filings from an investigation into Oklahoma City bombing now approved by a judge to move forward in federal court against the CIA and FBI. The crux of it is missing videotapes, a recurring problem in major terror incidents -- anyone remember those commercial surveillance videos that never got released from near the Pentagon 9/11 crash site? [VT 'Truth' & Skeptics views]

jessetrentadue.jpg

Unbeknownst to most, Jesse Trentadue, a diligent attorney from Salt Lake City, has been trying to wrench loose every last bureaucratic particle related to the 1995 Oklahoma City Bombing attributed to "lone wolf Patriot" Timothy McVeigh and his accomplice Terry Nichols.

Trentadue's brother died horribly while in custody of the US Bureau of Prisons, which he suspects was a case of mistaken identity linked to shadowy figures involved in OKC. Thus, in honor of his brother's memory, get all the files On the Table.

The bombing presaged a new era of domestic police legislation, more cops on US streets thanks to the federal government, the thorough discrediting of the general "Patriot" scene and so on. Current Attorney General Eric Holder had a "Trentadue Mission" as well in all of this.

Press coverage: Sept 9 2013: Judge orders trial in allegedly missing Oklahoma City bombing video case | Deseret News:

SALT LAKE CITY — A Salt Lake attorney who contends the FBI is hiding surveillance video associated with the 1995 Oklahoma City bombing might see his case go trial.

U.S. District Judge Clark Waddoups denied the government's motion to dismiss the case Monday and ordered both sides to prepare for a bench trial. He scheduled a status hearing for Nov. 21, at which a trial date will be set.

"This is a significant ruling," said Jesse Trentadue, who has spent years trying to get the tapes. "There's no doubt that evidence exists. The question then becomes why can't you find it. The obvious answer is you don't want to find it."

At issue is whether the FBI adequately responded to Trentadue's Freedom of Information Act request for footage of Timothy McVeigh parking a truckload of explosives at the Alfred P. Murrah Federal Building on April 19, 1995.

Specifically, he is after surveillance tape of the federal building and neighboring buildings as well as dashcam video from the Oklahoma state trooper who stopped McVeigh 90 minutes after the explosion that killed 168 people.

The FBI has released 30 videotapes and 200 documents in response to Trentadue's FOIA request.

Trentadue began looking into the bombing after his brother died in a federal detention center in Oklahoma. He believes federal agents mistook Kenneth Trentadue, a convicted bank robber, for a bombing suspect and beat him to death during an August 1995 interrogation. His official cause of death was listed as suicide.

Trenatdue claims the video will reveal a second bombing suspect who resembles but is not his brother.

Waddoups has chastised U.S. Department of Justice several times for not producing the tapes since Trentadue sued in 2008.

Previously on HongPong.com: Apr 19 2010: 2010 Oklahoma City Bombing Conspiracy Notes for April 19; Eric Holder's Trentadue Mission; SPLC Cutout @ Elohim City; CIA, National Geospatial Intelligence Agency roles | HongPong.com // March 11 2007: New 1995 Oklahoma City bombing conspiracy video from BBC! GOP's Rohrabacher rebukes FBI for coverup?? | HongPong.com. June 21 2011: Two murky major elements of covert American power: The US Treasury Exchange Stabilization Fund (ESF) & the FBI's little "S Drive" of deleted filez | HongPong.com . Briefly noted tangent at April 12 2012: Meet the new Boss in Town: ICE spawns... HSI Homeland Security Investigations, for great justice & cocaine cowboys | HongPong.com. Item on Dec 28 2010: Russia & China not buying BIS Fractional Reserve Gold currency scheme pushed by the Ben Bernank; FBI ALF informant developing Firefox 4 security, reminds OpenBSD FBI Backdoor | HongPong.com

Moar Notes: For the thoughtful documentary released in 2012 by local activists: Oklahoma City Bombing | Murrah Federal Building 1995 | A Noble Lie. See also notes from Kaye: jesse trentadue | AxXiom for Liberty. Oct 2012: Jesse Trentadue exposes who the FBI uses for informants. A lot of this gets to the FBI's shady secret file pockets such as the mysterious "S Drive": S is for Secret: Jesse Trentadue Discovers the FBI’s S Drive (June 2011). 2009 from IntelWire.com: Trentadue CIA Vaughan Index Sept 2009.

A Few Unresolved Backstories: Another dimension generally unknown is the large number of informants working for different agencies in the milieu McVeigh circulated in. This certainly included German BND intelligence agent Andreas Strassmeir ("Andy the German"), ATF informant & neo-Nazi Carol Howe, Rev. Millar at the "Elohim City" Christian millenialist compound (nicknamed Alphabet City for its many three-letter agency plants), and a weapons dealer named Roger Moore who Nichols alleged supplied the Kinestiks used in the truck bomb. Department of Homeland Security was involved in the Moore/Nichols/kinestiks thing. Just found this too.

The Southern Poverty Law Center (SPLC), an Alabama-based investigative/intelligence nonprofit organization with a huge endowment that dabbles in various legal cases involving racists and intolerant people, also was cited in numerous bits of the paper trail as having at least one informant of some kind they were using to provide information to the FBI.

While the SPLC has cultivated a positive reputation with liberals because of highly visible campaigns against racists, their still-partially concealed role is quite relevant to the complete truth around OKC. What did SPLC know and when did they know it? [And will they ever go after banks for making southerners poor??! Or would that harm their awesome endowment assets??]

//////

So basically around OKC, you have a level of informant saturation well above zero in this situation, and of course it's marketed as the "lone wolf" incident par excellence. What would undermine this narrative?

Well, as various official internal documents indicate rather directly, video footage from security cameras near the Murrah building showing multiple people in the Ryder truck would be pretty awkward, years later. There were certainly cameras around the building, and Trentadue has had these FOIA requests in for quite some time.

Anyway let's have ourselves some fresh court documents:

//////

Trentadue-court Order Grant Motion Strike Deny Motion Sj Ecf

//////

Trentadue-fifth Hardy Declaration Ecf

//////

Trentadue-plaintiff's Opposition Motion to Strike Ecf

//////

Trentadue-memo Motion to Strike Fifth Supplemental Declaration_ecf

OLDER DOCS for yr viewing pleasures:

FBI INFORMANT MANUAL - very important for beginning to discern how informants insert 'fake decision trees' into our reality:

FBI Informant Manual

//////

Intelwire writeup by JM Berger on the Roger Moore angle and such:

29355734 Trentadue CIA Vaughan Index Sept 2009

//////

Anyway I will leave it there for now, but it is great to see this slowly developing story jump forward for another round vs the national security coverup machine!

Backstories & Backbones; Security of US Emergency Alert System (EAS) is crap & spoof zombie apocalypses not very difficult apparently; #OpNSA NSA PRISM tunnel servers may be getting noticed; Joe Naccio & NSA revisited

Oh For Facks Sake. All this big government/police state techno-crap is so often easily hacked in some way, which means the Awesome Emergency Powers of Teh Govmints are easily subverted by the Baba Booey fans of the world, or zombie apocalypses as the case may be. Indeed quite possibly all this NSA crap is starting to get hacked (and not just by activists but cynical commercial weasels) and since it's all backdoored to everything and everyone's mom, everyone gets screwed. Well played. Truth tellers keep publishing before it's too late :/

Much of this is old news but why not batch some of it in one place?

On the newer lulz front at least some people are claiming to poke around including determining which servers run in-between points for PRISM mass surveillance for the NSA. And I don't know anything about these IOActive guys who posted on the EAS hack but they seem worth keeping an eye on….

Before the EAS info, here is a good place to look at alternative, well polished and much open source apps : https://prism-break.org/ - bookmark this and use it when setting up any new computer :)

Emergency Alert System Fail: Also covered in ars technica. See this video's crazy audio message for hacked Montana Emergency Alert System clip from this February: http://gawker.com/5983516/montana-tv-stations-emergency-alert-system-hac...

So more or less a main contractor mailed out the damn master login keys to their products controlling the national Emergency Alert System, exactly the opposite of what you're supposed to do.

Clearly in the event of some adverse network screwing with things, it will probably be a mess. Let's say a Jimmy Carter tries to cut off SAIC and Blackwater, triggering an epic new Iran Contra type Ollie North conspiracy scene -- all these dumb horrible systems like the EAS DASDEC will behave horribly.

/////

http://www.ioactive.com/news-events/ioactive_uncovers_vulnerabilities_in...

Press contact:
Craig Brophy
Global PR Manager, IOActive, Inc.
E: PR@ioactive.com
T: +1 206 462 2291

Press Release

IOActive Uncovers Vulnerabilities in United States Emergency Alerting System

Digital Alerting Systems DASDEC application servers found to be vulnerable to remote attack

Seattle, WA July 8, 2013IOActive, Inc., a leading provider of application security, compliance and smart grid security services, today announced that is has discovered vulnerabilities in the Emergency Alerting System (EAS) which is widely used by TV and radio stations across the United States.

IOActive's principal research scientist, Mike Davis, uncovered the vulnerabilities in the digital alerting systems - DASDEC - application servers. The DASDEC receives and authenticates EAS messages. Once a station receives and authenticates the message, the DASDEC interrupts the broadcast and overlays the message onto the broadcast with the alert tone containing some information about the event. The affected devices are the DASDEC-I and DASDEC-II appliances.

“Earlier this year we were shown an example of an intrusion on the EAS when the Montana Television Network's regular programming was interrupted by news of a zombie apocalypse. Although there was no zombie apocalypse, it did highlight just how vulnerable the system is,” said Mike Davis, principal research scientist for IOActive. “These DASDEC application servers are currently shipped with their root privileged SSH key as part of the firmware update package. This key allows an attacker to remotely log on in over the Internet and can manipulate any system function. For example, they could disrupt a station's ability to transmit and could disseminate false emergency information. For any of these issues to be resolved, we believe that re-engineering needs to be done on the digital alerting system side and firmware updates to be pushed to all appliances.”

The EAS is designed to enable to the President of the United States to speak to US citizens within 10-minutes of a disaster occurring. In the past these alerts were passed from station to station using the Associate Press (AP) or United Press International (UPI) “wire services” which connected to television and radio stations around the US. Whenever the station received an authenticated Emergency Action Notification (EAN), the station would disrupt its current broadcast to deliver the message to the public. On Wednesday 26 June, the Cyber Emergency Response Team (CERT) published an advisory providing details of the vulnerability.

IOActive has also issued its own IOActive Labs Advisory outlining the affected products, the impact and the solution.

About IOActive
Established in 1998, IOActive is an industry leader that offers comprehensive computer security services with specialisations in smart grid technologies, software assurance, and compliance. Boasting a well-rounded and diverse clientele, IOActive works with a majority of Global 500 companies including power and utility, hardware, retail, financial, media, aerospace, healthcare, high-tech, and software development organizations. As a home for highly skilled and experienced professionals, IOActive attracts talented consultants who contribute to the growing body of security knowledge by speaking at such elite conferences as Black Hat, Ruxcon, Defcon, BlueHat, CanSec, and WhatTheHack. For more information, visit www.ioactive.com.

////////////

http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02

Advisory (ICSA-13-184-02)

Monroe Electronics DASDEC Compromised Root SSH Key

Original release date: July 03, 2013

OVERVIEW

This advisory provides mitigation details for a vulnerability that impacts the Monroe Electronics DASDEC.

Mike Davis, a researcher with IOActive, reported a compromised root SSH key vulnerability to CERT Coordination Center (CERT/CC). This vulnerability is in Monroe Electronics DASDEC‑I and DASDEC-II appliances. ICS-CERT coordinated with CERT/CC and Monroe Electronics to resolve the vulnerability. Monroe Electronics has produced an update that mitigates this vulnerability.

This vulnerability could be exploited remotely.

AFFECTED PRODUCTS

The following Monroe Electronics products are affected:

  • DASDEC-I
  • DASDEC-II

IMPACT

An attacker who exploits this vulnerability could gain root access to the device and affect the availability, integrity, and confidentiality of the system.

Impact to individual organizations depends on many factors that are unique to each organization. ICS‑CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.

BACKGROUND

Monroe Electronics is a US-based company that maintains offices and research facilities in Lyndonville, New York. Monroe Electronics develops and distributes worldwide electrostatic measuring instruments including electrostatic voltmeters, electrostatic field meters, coulomb meters, and resistivity meters.

The affected products, DASDEC-I and DASDEC-II are emergency alert system (EAS) encoder/decoder (endec) devices that are used to broadcast EAS messages over digital and analog channels. According to Monroe Electronics, DASDEC-I and DASDEC-II are deployed across broadcast radio and television in the communication sector. Monroe Electronics estimates that these products are used primarily in the United States.

VULNERABILITY CHARACTERIZATION

VULNERABILITY OVERVIEW

COMPROMISED ROOT SSH KEYhttp://cwe.mitre.org/data/definitions/321.html, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotea_ixegenr" name="footnoterefa_ixegenr">a

DASDEC-I and DASDEC-II had publicly available firmware images for these devices that included a private SSH key that authorizes remote logins to the devices. For software versions prior to 2.0-2, where the default SSH keys have not already been changed, an attacker can then log into a device with root privileges.

CVE-2013-0137http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0137, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnoteb_ya73jua" name="footnoterefb_ya73jua">b has been assigned to this vulnerability. A CVSS v2 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/Au:N/C:C/I:C/A:C).http://nvd.nist.gov/cvss.cfm?version=2&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotec_6n5eegx" name="footnoterefc_6n5eegx">c

VULNERABILITY DETAILS

EXPLOITABILITY

This vulnerability could be exploited remotely.

EXISTENCE OF EXPLOIT

No known public exploits specifically target this vulnerability.

DIFFICULTY

An attacker with a moderate skill level could exploit this vulnerability.

MITIGATION

Monroe Electronics has produced a software update, Version 2.0-2 that resolves this vulnerability. DASDEC users can obtain the DASDEC v2.0-2 software update and release notes by contacting support@digitalalertsystems.com.

ICS‑CERT encourages asset owners to take additional defensive measures to protect against this and other cybersecurity risks.

  • Minimize network exposure for all control system devices. Critical devices should not directly face the Internet.
  • Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
  • When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPN is only as secure as the connected devices.

ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT Web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.http://ics-cert.us-cert.gov/content/recommended-practices, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnoted_t8orqgw" name="footnoterefd_t8orqgw">d ICS‑CERT reminds organizations to perform proper impact analysis and risk assessment prior to taking defensive measures.

Additional mitigation guidance and recommended practices are publicly available in the ICS‑CERT Technical Information Paper, ICS-TIP-12-146-01B—Targeted Cyber Intrusion Detection and Mitigation Strategies,http://ics-cert.us-cert.gov/tips/ICS-TIP-12-146-01B, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotee_wn76bab" name="footnoterefe_wn76bab">e that is available for download from the ICS-CERT Web page (http://ics-cert.us-cert.gov/).

Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS‑CERT for tracking and correlation against other incidents.

///////////

http://www.kb.cert.org/vuls/id/662676

Vulnerability Note VU#662676

Digital Alert Systems DASDEC and Monroe Electronics R189 One-Net firmware exposes private root SSH key

Original Release date: 26 Jun 2013 | Last revised: 02 Jul 2013

Overview

Digital Alert Systems DASDEC and Monroe Electronics One-Net E189 Emergency Alert System (EAS) devices exposed a shared private root SSH key in publicly available firmware images. An attacker with SSH access to a device could use the key to log in with root privileges.

Description

The Digital Alert Systems DASDEC-I and DASDEC-II and Monroe Electronics R189 One-Net/R189SE One-NetSE are Linux-based EAS encoder/decoder (ENDEC) devices that are used to broadcast EAS messages over digital and analog channels. IOActive has reported several security issues affecting these devices. The most severe of these issues is the public disclosure of the default private root SSH key. The less severe issues could also contribute to an attacker's ability to compromise a vulnerable device.

Compromised root SSH key (CVE-2013-0137)
Publicly available firmware images for these devices included a private root SSH key that was authorized to log in to the devices (CWE-798, CWE-321). The fingerprint for the compromised SSH key is 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3. Although this key is not hard-coded, it may be impractical for less technical users to manually disable or change they key prior to firmware version 2.0-2.

Predictable session ID
IOActive reports that the administrative web server uses a predictable, monotonically increasing session ID. This finding is based on running the web server in a test environment. Testing on a variety of firmware versions on devices both at the factory and in the field, Monroe Electronics could not reproduce this finding.

Log information disclosure
Logs available via the web server provide a variety of information about the configuration, operation, and status of the device (CWE-532). Some of the log information is public and may be required by regulation.

Predictable password generation
The dasdec_mkuser script generates passwords in a deterministic way (CWE-341), however these passwords are not for administrative access, and the script is not used for general user account configuration.

Default password
Like many similar devices, the DASDEC and One-Net ENDECs use default administrative credentials. Some sites fail to change the default administrative password and allow unrestricted internet access.

Impact

An attacker with the private key and SSH access can log in to a device with root privileges.

Predictable session IDs could allow an attacker to take control of an existing administrative web session.

Predictable and unchanged default passwords can allow an attacker to log in to a device with root privileges. Devices exposed to the internet are at particularly high risk, for example, see Secure EAS Codecs Prevent Zombie Attacks and US-CERT Alert TA13-175A.

Logs may disclose configuration information that can benefit an attacker.

Solution

Apply an update

On April 24, 2013, Monroe Electronics and Digital Alert Systems released firmware version 2.0-2 that disables the compromised SSH key, provides a simplified user option to install new unique keys, and enforces a new password policy. Monroe Electronics has taken considerable effort to provide update information to DASDEC and One-NetSE users.

DASDEC users can obtain updated firmware and release notes by contacting <support@digitalalertsystems.com>. R189 One-Net users can contact <eas@monroe-electronics.com>.

Disable compromised SSH key

The compromised root SSH key should be disabled immediately, especially if the SSH service is exposed to untrusted networks such as the internet. If SSH connectivity is required, generate, install, and test new SSH keys before disabling the compromised key. The fingerprint for the compromised SSH key is 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3.

Manually inspect SSH keys

To identify a compromised key, examine the authorized_keys file at /root/.ssh/authorized_keys2.dasdec and use the ssh-keygen command to show SSH key fingerprints. The following example shows the fingerprint for the compromised key:

$ ssh-keygen -l -f authorized_keys2.dasdec
1024 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3 wood@endec1 (DSA)

Note that ssh-keygen only shows the fingerprint for the first key/line in the file. If authorized_keys2.dasdec contains multiple keys (multiple lines, one key per line), it will be necessary to extract each key (line) to a separate file and run the ssh-keygen command on each key/file. These shell scripts can be used to list and test multiple SSH keys in an authorized_keys file:

To generate new SSH keys, use ssh-kegen.

Restrict access

If for some reason you are not able to remove and replace the compromised SSH key, restrict access to the SSH service to highly trusted hosts and networks only. As a general good security practice, restrict access to all services to trusted hosts and networks.

Change default passwords

Change any default passwords, and do not deploy production systems without changing default passwords. Search engines like Shodan can index systems exposed to the internet and default passwords are usually documented and well-known. It is often trivial for an attacker to identify and access systems on the internet using default passwords.

/////

#OpNSA: Some infos has been coming out about possible probing into the NSA PRISM system. Here are copies of some pastebins about all this. Start here: https://twitter.com/Op_NSA . It is indeed branded Anonymous and they said that two anons got searched over the weekend. What's cooking? Will the now-more-infamous NSA Q Group catch these cats?

#OpNSA claiming to have doxed some NSA officials and posting their phone numbers on interwebs. Something big may be taking off here -- if it turns out to be a honeypot there still better be lulz!

statement here:

Twitter: http://www.twitter.com/op_nsa

IRC: https://webchat.anonops.com/?channels…

Transcript below:

Greetings Citizens of the World, we are Anonymous. It is understood that the recent exposé of the national security agency has angered you. Anger caused by the realization that your own elected representatives promised to vote for your best interests but changed their minds when the price was right, in favor of increased surveillance on your normal everyday life. You hate them for voting your freedom and privacy away, and you have every right to. There are those that say you have nothing to fear if you have nothing to hide, but these are the same people who won’t tell you any of their own personal information upon your request. Complacent cowards like these have made it easier for this enormous surveillance operation to come to fruition. Eventually enough legislation will pass in favor of the evolving police state that will make every citizen a potential terrorist by default, and the NSA is at the core of it all. But you wonder to yourself, what can be done about all of this injustice and corruption? The answer is simple. Raise your voice so loud that no one can ignore it. Create such an overwhelming public outcry that the government and the media will be forced to acknowledge the issue. We need to show those directly responsible for all of this that there will be consequences for betraying us, and it will be the last time they do. In accordance with this we will be initiating stage two of operation national security agency and releasing the personal information of one politician each week that slandered Edward Snowden as a criminal and was involved with supporting the NSA and PRISM. We will make visible to everyone the depth of their violations against our freedom, privacy and well-being. We will expose the precise amount of money it took for them to turn their backs on us and we will show them how it feels to have their privacy abused and their personal information mined, collected and analyzed. But we won’t stop there. Since this affects not just Americans but everyone around the world, it is only right that we give this information as much exposure as possible. Spam the emails of your local representatives voicing your opposition to these surveillance measures along with president obama. Spread flyers regarding the NSA’s data mining and organize protests to inform the public. We will all need to work together in spreading this information as far and wide as we can so that the world is fully aware of what has been orchestrated at their expense. We are all in this together and have an obligation to awaken the masses to see how their rights are being stripped away one by one leaving themselves, their friends, their family and their children vulnerable to government manipulation and control. This will spark an awakening that cannot be stopped.

We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.

This one is interesting, I don't know why anyone would trust any VPN in particular tho :/

/////

http://pastebin.com/BzN9aUkq By: luminary on Jun 29th, 2013 | OpNSA VPN services.

Want to defeat PRISM?

Do you like the idea of free internet usage?

Well here is a list of Virtual Private Network providers recommended by Anonymous.

These services claim explicitly in their Terms of Service that they don't keep connection

logs on their customers, though it's always best to do some SERIOUS digging into a company's

history before you commit your freedom.

If you don't plan on doing anything illegal and you're merely trying to avoid snoopers

or circumvent censorship, free VPNs will likely suffice, but if you're going for a more

shady flavor of activism, don't leave home without these.

All of these accept Bitcoin, so that's a very helpful attribute. Bitcoin is a highly secure

payment method used if you don't want people to know who you are when you buy things over the internet.

BTGuard VPN

Private Internet Access VPN

Air VPN

PRQ VPN

Mullvad VPN

///////

http://pastebin.com/TpGTHDSy By: luminary on Jul 7th, 2013 | syntax: None | size: 2.45 KB | hits: 2,365 | expires: Never

PRETENTIOUS MINIATURE PRESS RELEASE:

Greetings, National "Security" Agency -- and our followers whom we love so much:

This may look like a small release, but it's actually huge. See, we hacked the NSA yet again because we just love doing that. These are DNS tunnels that are sending encrypted data to and from the PRISM databases. We have the IP's of those servers. If you crash these servers with DDoS, you literally render PRISM "broken". We are also planning to release some of that data (which we have access to) if we can decrypt it. So anyway. Hit these -- you hit PRISM. And die in the Matrix, you die in real life, etc etc.

SLIGHTLY TECHNICAL INFORMATION THAT MEANS NOTHING TO A LOT OF PEOPLE:

ns3-194.akamaiedge.net 56923 IN A 23.61.199.194

lar7.akamaiedge.net 64613 IN A 222.122.64.131

la11.akamaiedge.net 90000 IN A 213.254.238.131

lac1.akamaiedge.net 90000 IN A 193.108.88.1

la6.akamaiedge.net 70352 IN A 96.7.50.192

ns6-194.akamaiedge.net 90000 IN A 95.100.168.194

ns7-194.akamaiedge.net 90000 IN A 96.7.49.194

lar2.akamaiedge.net 84886 IN A 2.16.40.192

la1.akamaiedge.net 53942 IN A 184.26.161.192

lar6.akamaiedge.net 54809 IN A 195.59.44.137

la7.akamaiedge.net 39448 IN A 96.17.144.197

ns5-194.akamaiedge.net 35282 IN A 184.85.248.194

la3.akamaiedge.net 39672 IN A 96.7.251.131

Acquired by:

Restless

R00tsh3ll - @r00tsh3ll1 (twitter)

Intro Written and Info PASTED by:

Luminary - @aluminary (twitter)

PS:

There's TONS more information to release. We're going through some folders to see what we can and can't release before July 11th, 2013 (DDoS day). There's more to come. For those that have been asking for "proof of a hack", we're releasing some more as we go, but remember: this is the NSA. We have to be very careful about what goes public before we're done actually UTILIZING that information. For those that are understanding of this, you are the people that will receive the best information first! ^___^

//////

http://pastebin.com/X3siNZRC By: luminary on Jul 8th, 2013 | syntax: None | size: 3.64 KB | hits: 120 | expires: Never

Tor Tutorial

By: @aluminary

Greetings, faithful supporters of Anonymous and haters of PRISM. We are Anonymous, and for a moment, we're going to take time off from destroying things we don't like and teach you how to secure yourself and hide your identity while online. Naturally, this will be a benefit to you in the long run. Most people have no doubt heard of “TOR”, or “The Onion Router”. In basic terms, Tor is a routing network that sends all of your internet traffic through many different nodes all scattered about around the world. So imagine you've got a message you want to pass to a friend who's standing 100 meters from you. Whereas your standard internet traffic would be like walking over to your friend and handing him that note, Tor puts many different people between you two. So rather, in this situation, you'd hand the note to one of those people, they'd pass it to a random person, who'd pass that on, again and again until it gets to your friend. This allows the actual source of the traffic to be hidden after it comes through the exit node. Fortunately, Tor is very easy to acquire.

It can be downloaded from here: https://www.torproject.org/

For windows users, that download comes with the Tor browser bundle, which, when used, routes all of your traffic through a series of nodes as mentioned previously. Likely Linux users will know how to properly configure a client or program to use Tor, so we won't waste their time.

Once downloaded, that package will come with Vidalia Control Panel, an .exe file which acts as a sort of mothership. Once opened, a socks5 proxy server will begin running on local host. Your computer is the only computer on the network that will be able to use it unless others are also running Tor. The Tor browser will begin running on its own, so all you'll really need to do once in that browser is simply start searching away like a pro. If you want to verify your privacy because of paranoia, you can visit cmyip.com while using the Tor browser and be assured that your real IP is in fact hidden.

Tor itself is generally considered trust worthy. The thing is, even if nodes are run by undesirable parties, not only would said parties have to own that node, but they'd have to own the entire random path to... well... backtrace you. A downside of this entire thing, though, is that Tor is a high latency network. Because your traffic is being routed all around, it's also a bit slower. You will certainly notice slower internet speeds in applications using Tor (regular browsers not on the proxy won't be any slower). Then again, such a trivial matter is certainly worth the amount of protection Tor will offer you. Tor is a widely used and completely free project available at the aforementioned link.

Remember though, nobody is completely invincible. And human error can play into your traffic, or worse, your identity, being revealed. If, however, you take precautions to make sure Tor is operating and so forth, you will be fine. One more downside of Tor – that is one of the reasons a lot of us use VPN services – is that it's blocked in a lot of places. Because it's so easy and so anonymous, many websites, services, IRCs and networks will block Tor Exit Nodes to eliminate or crack down on abuse. In these cases, you'll probably need special permission to use the Tor server, as is the case with the AnonOps IRC network, which is one widely used meeting place for Anons.

Stay Anonymous. Stay safe.

Keep it up and defeat PRISM. Together, we are strong.

Together, we are Legion.

Twitter: https://twitter.com/op_nsa

IRC: webchat.anonops.com

channel: #opnsa.

^^You cannot use Tor with webchat. J/s

/////////////

Something ought to be said here ^ about the importance of other tracking links in browsers, time attacks, recent tor vulnerabilities that have come up etc. More caution and other layers are pretty surely necessary. Stuff like Ghostery to block various web tracker bugs for example.

A recent tor security example, you would need to keep javascript shut off to be safer from this, as but one example http://tedjonesweb.blogspot.com/2013/06/torbroker-security-vulnerability...

Another recent discussion http://seclists.org/fulldisclosure/2013/Jul/31

"I run 5 tor nodes. I can tell that 5 nodes on the network are save for me. Trust tor. I will not run dsniff or tcpdump. Its save. I will never abuse the logins you gave me for free. Afk now, that one guy is surfing on xhamster, nice video choice" -- "Alex"

Lol well put I suppose. Concise anyway.

Good tor network data source http://torstatus.blutmagie.de/

Router name agentAdrianLamo is doing well lol http://torstatus.blutmagie.de/router_detail.php?FP=ba7385668e2386246f2fb...

Tor vuln paper http://www.syverson.org/tor-vulnerabilities-iccs.pdf

http://www.blackhatlibrary.net/Tor

also for listserv activity https://lists.torproject.org/pipermail/tor-censorship-events/

Tor activity very much logged by NSA as shown recently http://nakedsecurity.sophos.com/2013/06/24/using-tor-and-other-means-to-...

Anyway it's just a normal hesitation in pointing out that Tor or given VPNs are not magically perfect for sure. There are merits to both technologies but magic boxes they are not! Of course one should assume the FBI is listening closely to IPs like webchat.anonops.com etc. 141.101.120.67 & 141.101.120.66

//////

For more on the Op_NSA situation check out

https://twitter.com/Op_NSA

https://twitter.com/aluminary

https://twitter.com/dickfacerax

///////

Email encryption in general:

For basics of encrypting email see Riseup.net: https://help.riseup.net/en/encrypting-email-with-thunderbird

Cryptome.org has had interesting stuff about PGP keys lately as well! http://cryptome.org/2013/07/mining-pgp-keyservers.htm & many posts on PGP keys registered to assorted federal departments! 2013-0744.htm 2013-0746.htm 2013-0741.htm etc

///////

More backstories and Backbones:

Here is a possible explanation of the Company A / B / C listings in the NSA Inspector General report. MCI, AT&T & Sprint:

Date: Wed, 03 Jul 2013 16:05:20 -0400
From: "James M. Atkinson" <jmatk[at]tscm.com>
Organization: Granite Island Group
To: TSCM-L Mailingin List <tscm-l2006[at]googlegroups.com>
Subject: Presidents Surveillance Program of 14 September 2001

On September 14, 2001 the NSA initiated a program on eavesdropping of all or the telephone and internet traffic of all U.S. Citizens, and concealed this quite unlawful program under many layers of secrecy, not because it as in the interests of national security, but rather to hide the violation of the Fourth Amendment.

These are the "initial three backbones" that the NSA tapped into (with the consent of the companies, each of whom gave the NSA full, unrestricted access):

The attached PDF file is a list of all of the funds spent by the program... do the math, and closely observe the date ranges (they perfectly match up, to the day with all of the dates in the Snowden document leaks).

MCI COMMUNICATIONS SERVICES INCORPORATED/MCI TELECOMMUNICATIONS CORPORATION
AMERICAN TELEPHONE & TELG COMPANY/AT&T
SPRINT COMMUNICATIONS COMPANY

In the IG report these aforementioned companies at listed at Company A, B, and C.

There are four additional companies (and others) to include Verizon, Nextel, Microsoft, Yahoo, Google, and so on.

See also procurement code: DAAB0701DH802 for Booze Allen Hamilton (Snowdens employer)

The project and procurement code as: DXXXXX01XXXXX

The program office as listed at:

2011 CRYSTAL DRIVE STE 911 (One Crystal Park Bldg "Crystal City 2" see also: http://cryptome.org/rummy-op2.htm)
ARLINGTON , VA , 22202-3732
USA

19.1 Billion Dollar Series of Contract initiated on the same day that the president authorized the Presidents Surveillance System for the NSA, and ending on the day it as shutdown.

Using a DUNS# of 790238638

The persons name under whom this was all listed is:

GRAFTON THOMAS BIGLOW
1312 Rhode Island Ave NW
Washington, DC 20005
(202) 483-8707

At the same address is:
Hope L Biglow

Grafton Bigelow is also listed at various addresses in:
414 Second
Cape May, NJ and West Cape May, NJ
(609) 884-4346

Plus several addresses in:
Hyattsville, MD
West Palm Beach, FL

But, the name Grafton Biglow also turns up:

FEDERAL PROCUREMENT DATA CENTER
7th & D Street SW, Room 5652
Washington, DC 20407
Director: Mr. Graffton Biglow
Fax: (202) 401-1546
Internet e-mail: grafton.biglow[at]gsa.gov

Curious coincidence.

Hopefully he had his own phone checked for bugs.

Maybe they can use the "Nuremberg defense"or claim "Befehl ist Befehl"

Very, very carefully look at the attached document, and take very deep and very slow breathes as you read it.

The bottom line is the Rainmaker system captured and indexed 1.17 racks per day of communications, bridging all major service providers, all fiber optic choke points, and eavesdropping mostly on U.S. Citizens (unlawfully) in what is called a "General Warrant" which is explicitly prohibited under U.S. Law.

The President of the United State is just a fucking moron, and utter and complete moron.

--- FUCK THE PIGS ---

-jma

--
James M. Atkinson. President and Sr. Engineer
"Leonardo da Vinci of Bug Sweeps and Spy Hunting"
http://www.linkedin.com/profile/view?id=15178662

Granite Island Group          http://www.tscm.com/
(978) 546-3803                jmatk[at]tscm.com
(978) 381-9111


Presidents-Spy-Program-Sept14-2001.pdf (342pp, 679KB)

/////////

The NSA Naccio Qwest case!

So there have been interesting developments. This bit about the contract hookups reminds me of Qwest's former CEO Joseph Naccio.

Here is what Naccio filed while fighting charges -- unlike virtually every white collar weasel ever, he ultimately got convicted of insider trading, no doubt with only the finest SIGINT available. Redacted PDF :: http://www.wired.com/images_blogs/threatlevel/files/512.pdf

http://www.denverpost.com/breakingnews/ci_22918125/former-qwest-ceo-joe-nacchio-moved-halfway-house - April 2013 he is getting out of jail soon with enormous fines as well. Many posts at Denver Post.

Nacchio, who turns 64 in June, was convicted in 2007 on 19 counts of illegal insider trading connected to his sale of $52 million in Qwest stock. A federal jury in Denver found that he sold the shares based on nonpublic information about the company's deteriorating financial condition.

Lucrative secret contracts indeedly doodley.

http://usatoday30.usatoday.com/news/washington/2006-05-10-nsa_x.htm 5-11-2006

The NSA, which needed Qwest's participation to completely cover the country, pushed back hard. ...

... the agency suggested that Qwest's foot-dragging might affect its ability to get future classified work with the government.

//////

Oct 15 2007: WSJ story: http://webcache.googleusercontent.com/search?q=cache:http://online.wsj.com/article/SB119240248793758652.html

Nacchio Alleges Reprisal

Qwest Ex-CEO Says Firm Denied Pacts After Spurning NSA

By

DIONNE SEARCEY

and

EVAN PEREZ

Contentions from former telecommunications executive Joseph Nacchio that the government retaliated against his company because he didn't comply with National Security Agency requests could add to the renewed debate over the NSA's secret surveillance of telephone records.

Once-classified documents that were unveiled in the insider-trading case of Mr. Nacchio, the former chief of Qwest Communications International Inc., Q +1.60% suggest the U.S. government didn't offer lucrative contracts to the company after Mr. Nacchio refused to cooperate with what the documents call "improper government requests" in February 2001. The documents, submitted as part of Mr. Nacchio's defense in the insider-trading case, don't elaborate on the government requests. Mr. Nacchio has said in the past he didn't comply when asked by the NSA for access to the private phone records of Qwest customers.

Mr. Nacchio in April was convicted in federal court in Denver of insider trading for selling $52 million of stock in the spring of 2001 as Qwest's outlook was deteriorating. He was sentenced to six years in prison but remains free pending his appeal. His attorneys suggested in pretrial filings that Mr. Nacchio believed the company was about to win secret government contracts that would keep it in the black, despite warnings from his executive team that the company was in financial trouble. The judge at his trial didn't allow much of the classified defense, and Mr. Nacchio's appeal disputes that decision. The latest revelations were in pretrial briefs filed months ago that were unsealed last week.

A spokesman for the Director of National Intelligence office, which oversees the NSA and other intelligence agencies, declined to comment on the allegations in the court filings.

The revelations emerge as the White House is in negotiations with Congress on long-term changes to the 1978 Foreign Intelligence Surveillance Act. Democrats, and some Republicans, in Congress are at odds with the Bush administration's demand that lawmakers preserve the secrecy of the NSA program by granting telecommunications companies immunity from lawsuits for any aid they gave to the government surveillance without a court order.

The administration has balked at giving Congress documents detailing the legal justifications for the NSA program, and says that the secrecy is necessary to protect national security.

Speaking on Fox News channel yesterday, House Majority Leader Steny Hoyer (D., Md.) restated his position that Democrats were willing to pass such immunity, if the administration turned over documents about the NSA program.

Write to Dionne Searcey at dionne.searcey@wsj.com and Evan Perez at evan.perez@wsj.com

///////////

The Daily Caller is trying to get this narrative bounced again: http://dailycaller.com/2013/06/13/jailed-qwest-ceo-claimed-that-nsa-retaliated-because-he-wouldnt-participate-in-spy-program/

CBS news in 2009: http://www.cbsnews.com/2100-250_162-1616326.html

Naccio's argument was not allowed in open court. Of course that Denver judge also had the NSA all over his phone too I would hazard to guess.

But who cares what the NSA does to judge's phones anyway? (see NSA whistleblower Russ Tice specifying NSA space asset surveillance vs Justice Alito for example)

Don't forget Israel re NSA contractors: read up on James Bamford on Israeli contractors & the NSA: http://www.wired.com/threatlevel/2012/04/shady-companies-nsa/ . A few salient snippets on the pervasive role of the spinoff companies of Israel's NSA equivalent, Unit 8200:

Like Narus, Verint was founded by in Israel by Israelis, including Jacob “Kobi” Alexander, a former Israeli intelligence officer. Some 800 employees work for Verint, including 350 who are based in Israel, primarily working in research and development and operations, according to the Jerusalem Post. Among its products is STAR-GATE, which according to the company’s sales literature, lets “service providers … access communications on virtually any type of network, retain communication data for as long as required, and query and deliver content and data …” and was “[d]esigned to manage vast numbers of targets, concurrent sessions, call data records, and communications.”

In a rare and candid admission to Forbes, Retired Brig. Gen. Hanan Gefen, a former commander of the highly secret Unit 8200, Israel’s NSA, noted his former organization’s influence on Comverse, which owns Verint, as well as other Israeli companies that dominate the U.S. eavesdropping and surveillance market. “Take NICE, Comverse and Check Point for example, three of the largest high-tech companies, which were all directly influenced by 8200 technology,” said Gefen. “Check Point was founded by Unit alumni. Comverse’s main product, the Logger, is based on the Unit’s technology.”

According to a former chief of Unit 8200, both the veterans of the group and much of the high-tech intelligence equipment they developed are now employed in high-tech firms around the world. “Cautious estimates indicate that in the past few years,” he told a reporter for the Israeli newspaper Ha’artez in 2000, “Unit 8200 veterans have set up some 30 to 40 high-tech companies, including 5 to 10 that were floated on Wall Street.” Referred to only as “Brigadier General B,” he added, “This correlation between serving in the intelligence Unit 8200 and starting successful high-tech companies is not coincidental: Many of the technologies in use around the world and developed in Israel were originally military technologies and were developed and improved by Unit veterans.”

Equally troubling is the issue of corruption. Kobi Alexander, the founder and former chairman of Verint, is now a fugitive, wanted by the FBI on nearly three dozen charges of fraud, theft, lying, bribery, money laundering and other crimes. And two of his top associates at Comverse, Chief Financial Officer David Kreinberg and former General Counsel William F. Sorin, were also indicted in the scheme and later pleaded guilty, with both serving time in prison and paying millions of dollars in fines and penalties.

Anyway that's enough stuff for now. Figure better to get a hard reference of it for those interested!

Federal Homeland Security TSA VIPR Team & #VikingsDrone: Suspicious drone & Feds spotted at Vikings/Packers game

Things are a little strange at the Vikings/Packers Game today. A drone has been photographed hovering around the Metrodome fan plaza on the west side, and a Homeland Security / TSA "VIPR" team has been hanging around as well, indicating the federal government is shifting into "protecting" the major Spectacles at taxpayer expense.

My friend Nathan Hansen noticed the #VikingsDrone and the VIPR team, documenting & posting them on twitter @nathanmhansen. [Note: awhile back I did a 'lil client design work for Hansen.]

//// UPDATE 12:15PM Monday: According to @TCRover, a branch of the Pioneer Press, the drone was NOT operated by the government but rather some production company. The pic they say is from the crew flying it earlier: See https://twitter.com/TCRover/status/285560684245315585/photo/1 . Nonetheless we still need to deal with the impending prospect of government & contractor drones filling our airspace - and indeed this story has prompted others to discuss other sightings near government sites. //// 2:20PM update: It's annoying that they tried to tweet @ me last night but it never turned up in my timeline so I didn't find out until today. I would have much preferred to straighten it out immediately! Also, here's what's going on with drones in Oklahoma... Follow my friend @axxiom for more. ////

PHOTO sources: yfrog Fullsize - http://twitter.yfrog.com/h41hxevhj // yfrog Fullsize - http://twitter.yfrog.com/o0mkqkobj // yfrog Fullsize - http://twitter.yfrog.com/oemubbyj // VIPR Team: yfrog Fullsize - http://twitter.yfrog.com/odjd2ybj

odjd2ybj.jpeg h41hxevhj.jpeg

You can see the four rotors pretty well on these pics. It is comparable to the sports photography drone linked below as well - I figured it might just be a civilian hobbyist drone or some weird sports media project drone until the VIPR team was found by Hansen.

mkqkob.jpg mubby.jpeg

I am just delighted that the national government had to borrow more money at interest from the Federal Reserve System in order to send out these guys and their fancy flying spy robot to the Vikings/Packers game. We get the twin benefits of national debt slavery AND a surveillance state with nothing useful to do!

Our friends at WTFNews cranked out a quick post on this already: Unidentified Drone Spotted at @Packers-@VikingsFootball @NFL Game » WTF RLY REPORT

Let's Ban This Drone Operation in Minneapolis: Already Minneapolis activist Kurtis Hanna has suggested a petition to get drones banned on the city charter. (come to think of it, wouldn't it be good to get something like the White House petition site for the Mpls Charter Commission?) I will include some info below on this.

The Department of Homeland Security and the National Football League have a burgeoning relationship. Previously when I wrote up a post on the relatively new and totally off-the-radar Homeland Security Investigations division (basically their own militant version of the FBI, intended to reach BATF-level org status) they did a drill black helicopter landing on the Super Bowl field. [yes really - HSI is so new I must have been the first person to satirize its absurdities on the whole interweb!] See April 12 2012: Meet the new Boss in Town: ICE spawns... HSI Homeland Security Investigations, for great justice & cocaine cowboys | HongPong.com

The Super Bowl and World Series are also both declared National Special Security Events, which activates a fat block of overtime for many federal police agencies, much like the Republican & Democratic National Conventions. (However, since rioting at sports events is closer to the booze-soaked Id of the American public than more 'political' street upheavals, it doesn't meet the same heavy hand from federal & local police agencies) NSSEs generally feature Homeland Security, FEMA and the Secret Service operating at a high tempo, another thing that HSI & TSA are getting involved with as a 'filler force' if you will.

For Super Bowl NSSE info see: Super Bowl XLVI, NSSE & Big Sis - YouTube // www.secretservice.gov/press/pub0202.pdf on Bowl XXXVI // this crazy PDF: rnc08report.org/engine/uploads/1/Day-2-Breakout-2-NSSE-Carillo-Lowry-Lumley.pdf // Infowars » Indy Super Bowl: National Security State Protects Sports Fans from Prostitutes // National Special Security Events: 8. NSSE Fill-in Fact Sheet // Article Detail - Domestic Preparedness via LLIS.gov // etc

Federal VIPR teams: been popping up in all sorts of places. Here's the Wiki page. Wiki notes GAO attributes their existence to a Reaction to the shady Madrid train bombings. VIPR is trying to get at pro sports & local transportation (the Hiawatha light rail has a station close to where they were photographed) and wherever else they can normalize their presence. In this case the VIPR deployment apparently includes at least a half-dozen uniformed officers and at least one drone.

Additionally there was strange audio interference right before a commercial break in the first half, kind of like the sound a cell phone makes when its microwave signal induces noise in a speaker or electronics. However, I don't think game-day satellite transmissions go straight over-the-air from the Metrodome, as there aren't really satellite dishes around there I've noticed. Thus it seems unlikely to me that the one spotted drone would have glitched the transmission. Perhaps unrelated but also something you don't usually see. I blame Wisconsin FalseFlag types for this noise, whoever that might be :-P

SEE ALSO:

The drone does look similar to the one in this story. New use for drones: Sports photography - CBS News

Oh this is great. Perhaps the best link I've found in this. "PUT [VIPR] TEAMS TO WORK FOR YOU" VIPR teams and pipelines!! A "no cost resources for expanding and enhancing your security". Free oil goon security? Screw that: www.dleg.state.mi.us/mpsc/gas/download/2011SS-2-4-VIPR_Handout.pdf

May 2012: TSA VIPR Team Spotted at… Detroit Music Festival?? « TSA Out of Our Pants!

CNN Jan 28 2012: TSA rail, subway spot-checks raise privacy issues - CNN.com

VIDEO Blackburn Questions TSA Officials on VIPR Teams - YouTube

VIDEO TSA VIPR Teams in Greyhound Bus Station Tampa FL 02/16/2010

TSA deploys 'VIPR' teams throughout Tennessee to set up illegal security checkpoints on interstates - NaturalNews with a bunch of other links including: TSA-style full body pat-downs coming to an NFL stadium near you (Sept 2011) etc

6 USC § 1112 - Authorization of Visible Intermodal Prevention and Response teams | LII / Legal Information Institute. So they are doing this about the Hiawatha light rail officially I would guess. This would also signify that Metro Transit would have some record of the situation if "consult" in Sec.4 has occurred

(a) In general

The Secretary, acting through the Administrator of the Transportation Security Administration, may develop Visible Intermodal Prevention and Response (referred to in this section as “VIPR”) teams to augment the security of any mode of transportation at any location within the United States. In forming a VIPR team, the Secretary—

(1) may use any asset of the Department, including Federal air marshals, surface transportation security inspectors, canine detection teams, and advanced screening technology;

(2) may determine when a VIPR team shall be deployed, as well as the duration of the deployment;

(3) shall, prior to and during the deployment, consult with local security and law enforcement officials in the jurisdiction where the VIPR team is or will be deployed, to develop and agree upon the appropriate operational protocols and provide relevant information about the mission of the VIPR team, as appropriate; and

(4) shall, prior to and during the deployment, consult with all transportation entities directly affected by the deployment of a VIPR team, as appropriate, including railroad carriers, air carriers, airport owners, over-the-road bus operators and terminal owners and operators, motor carriers, public transportation agencies, owners or operators of highways, port operators and facility owners, vessel owners and operators and pipeline operators.

(b) Authorization of appropriations

There are authorized to be appropriated to the Secretary to carry out this section such sums as necessary for fiscal years 2007 through 2011.

Process for City Charter Amendment for banning these drones: Sent along by Kurt Hanna who thinks that "10,791 valid signatures of Minneapolis residents who are registered voters in order to qualify for the ballot" based on the figure of 215,806 voters voting last time. Citizen petition timeframe link. BUT: How much time do we have to gather these signatures?

Some more info: Via Minneapolis City Charter: http://library.municode.com/HTML/11490/level2/SUHITA_CH.html

(1) The methods available for amending a home rule city charter are contained in Minnesota Statutes, Section 410.12 et seq., which provides as follows:

(1) 410.12 AMENDMENTS. Subdivision 1. Proposals. The charter commission may propose amendments to such charter and SHALL DO SO upon the petition of voters equal in number to five percent of the total votes cast at the last previous state general election in the city.Proposed charter amendments must be submitted at least 12 weeks before the general election. Only registered voters are eligible to sign the petition. All petitions circulated with respect to a charter amendment shall be uniform in character and shall have attached thereto the text of the proposed amendment in full; except that in the case of a proposed amendment containing more than 1,000 words, a true and correct copy of the same may be filed with the city clerk, and the petition shall then contain a summary of not less than 50 nor more than 300 words setting forth in substance the nature of the proposed amendment. Such summary shall contain a statement of the objects and purposes of the amendment proposed and an outline of any proposed new scheme or frame work of government and shall be sufficient to inform the signers of the petition as to what change in government is sought to be accomplished by the amendment.The summary, together with a copy of the proposed amendment, shall first be submitted to the charter commission for its approval as to form and substance. The commission shall within ten days after such submission to it, return the same to the proposers of the amendment with such modifications in statement as it may deem necessary in order that the summary may fairly comply with the requirements above set forth.

Subd. 2. Petitions. The signatures to such petition need not all be appended to one paper, but to each separate petition there shall be attached an affidavit of the circulator thereof as provided by this section. A petition must contain each petitioner's signature in ink or indelible pencil and must indicate after the signature the place of residence by street and number, or their description sufficient to identify the place. There shall appear on each petition the names and addresses of five electors of the city, and on each paper the names and addresses of the same five electors, who, as a committee of the petitioners, shall be regarded as responsible for the circulation and filing of the petition. [........]

(1) Subd. 3. May be assembled as one petition. All petition papers for a proposed amendment shall be assembled and filed with the charter commission as one instrument. Within ten days after such petition is transmitted to the city council, the city clerk shall determine whether each paper of the petition is properly attested and whether the petition is signed by a sufficient number of voters. The city clerk shall declare any petition paper entirely invalid which is not attested by the circulator thereof as required in this section. Upon completing an examination of the petition, the city clerk shall certify the result of the examination to the council. If the city clerk shall certify that the petition is insufficient the city clerk shall set forth in a certificate the particulars in which it is defective and shall at once notify the committee of the petitioners of the findings. A petition may be amended at any time within ten days after the making of a certificate of insufficiency by the city clerk, by filing a supplementary petition upon additional papers signed and filed as provided in case of an original petition. The city clerk shall within five days after such amendment is filed, make examination of the amended petition, and if the certificate shall show the petition still to be insufficient, the city clerk shall file it in the city clerk's office and notify the committee of the petitioners of the findings and no further action shall be had on such insufficient petition. The finding of the insufficiency of a petition shall not prejudice the filing of a new petition for the same purpose. (Back)

(1) Subd. 4. Election. Amendments shall be submitted to the qualified voters at a general or special election and published as in the case of the original charter. The form of the ballot shall be fixed by the governing body. The statement of the question on the ballot shall be sufficient to identify the amendment clearly and to distinguish the question from every other question on the ballot at the same time. If 51 percent of the votes cast on any amendment are in favor of its adoption, copies of the amendment and certificates shall be filed, as in the case of the original charter and the amendment shall take effect in 30 days from the date of the election or at such other time as is fixed in the amendment.

An amusing side question: is this "magick" security theater? Security Theater of course works most "effectively" at materializing psychological phantoms with an audience at a Spectacle. This is the perhaps the principle Stimulus Effect intended by Homeland Security & its general orientation around 'visuals' which is not that different than Ceremonial Magick, which is [arguably] anything that generates a certain sense-impression in the mind of Observers.

metrodome-national-guard.jpeg

Another old backstory: In 2010 some people noticed they were using government photos of MN National Guard riot control gear from the deployment at the 2008 Republican National Convention under the NSSE system for recruitment propaganda on the Metrodome. RNC '08 Report: Our News: National Guard advert on Metrodome, proposed site of 2012 DNC, depicts soldiers deployed against protesters during 2008 RNC. Your tax dollas at work!

Occupy gets rolling in Sandy disaster relief; Far Rockaway & Staten Island in a messy situation; #hurricanehackers Sandy Crisis Camps this weekend

Via Occupy Sandy Relief NYC 4 hrs ago: https://www.facebook.com/OccupySandyReliefNyc?fref=ts

379035_381284791951728_2047353211_n.png

>>> #NOT ANOTHER KATRINA <<<
Contrary to what might be inferred by a media and government blackout - Rockaway IS. NOT. RECOVERING.

We can't stress this enough. It looks like parts of New Orleans after Hurricane Katrina.

Residents are being told they will receive NO assistance, no food, no medicine, NOTHING if they remain in Rockaway

As of a few hours ago Occupy Sandy Relief has a community hub up and running at Beach 113th Street and Rockaway Blvd. We are distributing lights, clothing, blankets and warm food.
DO NOT ARRIVE AT NIGHT! We will be open and ready for more volunteers and supplies tomorrow morning.
- More photos, need lists and stories to come

The whole situation in the east coast is really rough right now. I'm going to post copies of these pads right now in the hopes of circulating some material. This should prove once and for all that "preppers" have an important role to play in avoiding total disaster -- but of course in these circumstances it takes all of us working together. Where the various levels of government are totally messed up, people are making things happen in a horizontal way, covering emergency basic needs and anchoring anxious communities.

Hope it helps, there are a lot of places to plug in & postal addresses accepting supplies if nothing else....

People looking for something to do might want to check out #HurricaneHackers. Sandy CrisisCamp | CrisisCommons. Also Ushahidi is being used for crowd mapping services . Recovers.org is also being used - subdomains for locales. Tune in @globalrevlive as well for updates. At this time, a hub for distribution of aid in Rockaway has already been set up. Staten Island is definitely out of gas and things are hard to find out there but hopefully more will be known Thursday.

The main hubs going on right now: OccupySandy hub: http://interoccupy.net/occupysandy/, also email: OccupySandy@interoccupy.net or occupysandy@gmail.com - includes drop off locations for donation items . Facebook page: https://www.facebook.com/OccupySandyReliefNyc- users are posting some crazy stuff on here.

//// Obligatory Bonus Paranoia Notes: I'm not feeling the FreakOut Vibe right now -- let's relax and get things done, ok?! -- but some things on the margins ought to be noted anyway. if the US military becomes more activated under semi-federalized powers, expect NORTHCOM CONPLAN 3501 generally, and CONPLAN 3502 to be activated - see my Nov 2010 story for more. At this time seems unlikely - but the double-bonus Word From the Weird Cats is that HAARP-type energy distortions are indicated charging for California quakes (FB) & there are a bunch farther up the Pacific fault in Canada going lately. I don't have a strong opinion about Tactical Weather Modification being the explanation for this kind of thing routinely, however also no one really wants to mention all the weather control tech that is routinely used, and not logged. Who can work out the insurance consequences of, say artificial snowfall in Colorado & downwind drought effects? Let alone the interesting troposphere electromagnetic tech systems - the HAARP patents! .... Once things settle down, we need to really demand inventory and activity logs of all this fancy stuff - reasonable enough?? /////

Here's a copy of the InterOccupy page right now: http://interoccupy.net/occupysandy/

@OccupySandy
Occupy Sandy is a coordinated relief effort to help distribute resources & volunteers to help neighborhoods and people affected by Hurricane Sandy. We are a coalition of people & organizations who are dedicated to implementing aid and establishing hubs for neighborhood resource distribution. Members of this coalition are from Occupy Wall Street, 350.org, recovers.org and interoccupy.net. The task of rebuilding communities is a marathon and not a sprint. We thank you for your donations and your support. The hubs we have set up so far are listed below and photos and volunteer updates are available on our facebook: www.facebook.com/occupysandyreliefnyc. To contact us with information that should be included on this hub, please email OccupySandy@interoccupy.net

To get regular updates by text message please text "occupysandy" to 23559.

Enter your email in the form on the left to receive news and updates about how you can help!

Financial Donations can be made to:
https://www.wepay.com/donations/occupy-sandy-cleanup-volunteers


Volunteer to Help Out the Relief Effort:
http://interoccupy.net/occupysandy/volunteer/


To locate an Emergency Shelter:
http://www.nyc.gov/html/misc/html/2012/hurricane_shelters.html


For anyone who needs assistance with food:

Citymeals www.citymeals.org is delivering shelf-stable meals to seniors. If you come across any senior housing, please contact Citymeals and make them aware. Email Rachel@citymeals.org.

Emergency food stamps: Call 718-557-1339. Many people may qualify for the Disaster-Supplemental Nutrition Assistance Program (D-SNAP).

To donate goods, here is a list of needs and where you can drop them off:

GENERAL NEEDS - ALL LOCATIONS NEED THESE ITEMS

blankets
candles
flashlights
batteries
water
food
socks
towels
printer paper
baby items: diapers etc.
pet food

DROP-OFF LOCATIONS


Astoria
36-10 Crescent St. 2nd floor.
Contact Pam: 718-208-7205

Chinatown (open Nov 1, 10am-5pm)
CAAAV
46 Hester St Frnt A
(212) 473-6485
justice@caaav.org - email provided, but best to just show up to help or bring supplies!

Specific Requests in Chinatown:
Water bottles
C, D, AA, AAA batteries (and one 9 volt battery)
Food (hot at lunch, non-perishable/bread/cookies)
Some bottles of Ensure (Glucerna shake) for the elderly, vitamins for the elderly
Generator (for shelter at 350 Grand St, Seward Park High School)


Rockaway and Far Rockaway
Location 1:
Firehouse on 59th street
across from the train station.
contact person: Jean Dupont 9179755623

Location 2:
Veggie Island
96th Street and Rockaway Blvd.

Location 3:
Store Front Community Center
B113 and Rockaway Beach Blvd

Specific Requests in Rockaway and Far Rockaway (starred ones are most urgent):
* Propane grille or camping style oven
* Plates, cups, forks, bowls, spoons, etc
* blankets, jackets, gloves, hats, anything to keep folks warm
* cleaning supplies - buckets, squeegies, mops, bleach
* masks, gloves for cleaning
* socks
* water
* tarps
* garbage bags
boots
electric stove
gas stove
satellite phones
big paper, tape, markers
pens, paper, notepads
generators
pumps
camping tables
gasoline
gasoline containers
percolator
fire extinguishers
walkie talkies
i9 tablets
projector/illuminator


Fort Green/Clinton Hill
45 Waverly Avenue
just off of Park Ave in Fort Green/Clinton Hill
(Hours for Nov 1: 10am-6pm)

Park Slope
Park Slope Armory
361 15th St, Brooklyn

Sunset Park
St. Jacobi Church
5406 4th Ave
Contact: Ronnie 646-353-5194

Specific Requests in Sunset Park:
steamtable foil pans full or half size w lids
blankets
cleaning supplies
tin foil
saran wrap


Williamsburg (starting Nov 1, 10am)
Residence
306 Leonard St, apt J1 (btwn Conselyea and Metropolitan)
Contact: Jennifer (917) 586-4153

Bedstuy
Residence
136 Jefferson Ave, apt 2 11216

East Billyburg (Beginning Thursday Nov 1 at 12 noon)
House of Yes
342 Maujer st
Contact: Kae Burke (525)217-7209

Harlem
Location 1:
Residence
47 saint nicholas avenue #4d
btw 112 and 113

Location 2:
Residence
938 st Nicholas ave # 25 at corner of 157th and st Nicholas ave.

Lower East Side
The Bowery Mission
45-51 Ave D
212-777-3424
contact: Claude Nelson or any "operations manager" on duty. they're open 24/7 and in need of prepared foods, a generator and anything else you can offer.

Specific Requests at Lower East Side:
Generator
Prepared Foods


RECOVERS.ORG PAGES


Occupy Wall Street & 350.org have teamed up with Recovers.org - a people-powered disaster relief platform - to help coordinate response to Hurricane Sandy in NYC. At Recovers.org we are launching support pages where people can GIVE help or post a NEED. Here is more information about this coalition.

We have started with the following Recovery pages, and more will be coming soon:

https://lowereastside.recovers.org/ - (646) 580-7473
https://astoria.recovers.org/ - (347) 669-4394
https://redhook.recovers.org - (347) 464-9269
https://statenisland.recovers.org/ - (347) 934-9927 - statenislandrecovers@gmail.com - @SIrecovers

TWITTER HASHTAGS


The following hashtags are being used for tweets related to Sandy:
#sandy
#hurricanesandy
#sandyrecovery
#sandyaid
#sandyvolunteer

| occupysandy@interoccupy.net



*************

#HurricaneHackers
  • Coordination
  • Twitter: @hurricanehackrs
  • email list: hurricanehackers@mit.edu
  • Hashtag: #hurricaneHackers
  • Key Links:

************

This is the main Occupy volunteer pad: SandyVolunteer | Etherpad Lite

Welcome to OCCUPY SANDY's Volunteer Network:
  1. POST AN OFFER or NEED to your fellow occupier directly through this document (cross off as needs are met!) or
  1. VOLUNTEER through the many resources provided below
Read Me:
  • Logistics!
  • Welcome! :-) Sign in + choose a name & color in the top right-hand corner, and Chat in the bottom right-hand corner.   
  • Post your OFFER or your NEED of help below, along with location atnd a way for people to contact you! Cross off needs as they are met!
  • Warnings!
  • Don't retweet requests for donations to Occupy Sandy--that is just some dude' s attempt to make money off this.
  • Emergency #s!
  • 911: for emergencies only! / 311 or text to 311692 for non-emergencies; FDNY will be able to charge life essential equiptment every 6 hrs if your area is accessible

OFFERS "I can help with..." (don't forget contact info!)
  • MANHATTAN
  • OFFER @Neiki2u: Upper West Side
  • @joallen17 EMT Certified, available to assist. Located on UpperWestSideNYC.
  • Here in East Harlem (122nd and Lex) but can help. 785.423-5280. Email: debra.whoopdeedoo@gmail.com
  • I am @jhazard I am on Upper Westside of Manhattan. I am a journalist and Web product manager. I can't code, but I want to help any projects trying to coordinate communications and information.
  • @ericaswallow here. On 96th and 2nd. I am a journalist and director of community @contently. Can't code, but able bodied and can help with coordinating communications. @jhazard above is my coworker. :)
  • I am @iamceci located in spanish harlem E 104 & 2nd Ave. Fluent in spanish, able bodied. 508-685-6923; cecilia.d.pineda@gmail.com. #sandyvolunteer let me know how i can help!
  • I am @Ayo_ARo on the Upper West Side. Able bodied, proficient in Spanish, great with people esp. kids, K-12 tutor (all subjects), resume writing and editing. Can walk to wherever I'm needed.
  • I am @shmuta- on the Upper East Side with many young people. Lots of hands! Trying to find a way to help. Have signed up but havent heard anything from anyone!
  • I am @A. I am located in Midtown but can come downtown if you require help in canvassing needs/delivering food and water.
  • BROOKLYN
  • In Central Brooklyn and can help anywhere I can walk to from Eastern Parkway and Franklin. Hit me on Twitter: @mickeysteiner
  • I'm in Prospect Heights/Crown Heights and can help anywhere I can walk to from Nostrand Ave and Prospect Place. Can carry up to 40 lbs, available Wednesday and Thursday. Find me on Twitter: @syntactics
  • I'm in Williamsburg Brooklyn, ready to help however possible! Can carry loads up to 50 lbs, available all day and night Tuesday, Halloween night, and Saturday. Gracegclarke@gmail.com, (314)757-0602
  • Also in Williamsburg. Can help. @scottmbarrett
  • I'm in Crown Heights, Brooklam I am fluent in English and Spanish and am ready to help angiewoody@gmail.com
  • I'm in Prospect Heights, Brooklyn, ready to volunteer! I have a car, I'm fluent in English and Spanish, and can help however I'm needed! emmayorra@gmail.com 802 522 8215
  • I am @alexfiorillo and am in Downtown Brooklyn/Gowanus/Park Slope. Can help with whatever and am ready to volunteer!
  • I am @ngawesome in Brooklyn and will find a way to get anywhere, please email nglisko1@aol.com if you are looking for volunteers!
  • I am in Clinton Hill, Brooklyn, I am able bodied, and willing to go anywhere, i speak conversational spanish and I've had a lot of experience working with children, please email katiajohnstone@gmail.com
  • I am @itsmefi and in Prospect Heights. Can help however possible and ready.
  • I am @osin located in Bushwick, BK. Willing to go anywhere and help with anything necessary.
  • I am @highlyfe87 located in Carroll Gardens, Brooklyn can volunteer in Downtown BK, Gowanus, Park slope, Red hook. Can help pretty much anywhere within 2-3 miles. email bkcachaco07@gmail.com
  • In Flatbush, can walk up to 4 miles to help. @kmgrimm or kmgrimm@gmail.com.
  • In downtown Brooklyn, ready and willing to help. I speak English & Russian, call me at (347)-834-6805.
  • I've got a car, bunch of carpentry tools/skills, bike mantainence skills, willing to make/transport food, manual labor, build stuff, tear stuff down, dig stuff out. My wife is registered nurse. live in Clinton Hill BK (patrickfbrosnan@gmail.com)
  • I'm @alyanumbers and am in Crown Heights. I have a bike and can deliver small-ish packages around Brooklyn (or even up to Manhattan). I speak French and Arabic (and some Spanish).
  • @precursor and I have a car, HAM radio equipment (and license of course) and a basic set of tools. Skills involve communications and construction.
  • QUEENS
  • @chuuuckDEE here, based in Jamaica, Qns. able-bodied and down to assist w/ the effort..
  • I'm available to lend a hand in Astoria Queens near Astoria Blvd stop. @helenamusic send me a DM
  • I can also lend a hand in Astoria Queens. pointslou@gmail.com
  • I'm available to help in the East Elmhurst/Astoria area. Ready, willing and able to work at whatever. DM me at @AgentArmando pls with details
  • Hi, Jake here in Woodside, Queens. I'm a carpenter / handyman with tools - ready to offer my labor or just help out in general. Contact me on Twitter: @jm4277k
  • Hi, I'm @misaqui, living in Sunnyside-11104. Count on me to help in the Area.
  • I live in Flushing, have minimal hours and no car, but am nevertheless eager to help. Skills in childcare, senior aid, animal care, and writing @chicathlete424, scfrager@gmail.com
  • Also able-bodied, looking to help. Astoria Ditmars, no car, but if transportation can be arranged, will travel. hairlessOrphan@gmail.com
  • BRONX
  • Need ride to shelter in Bronx? send DM to me @corinne565
  • I have a bag of clothes for woman size L and Men XXL - pants, shirts, shoes....willing to travel to the city tomorrow or rent a zipcar to drive to other affected areas. Can also lift 50+ lbs, donate canned goods, organize and assist. Email Jrrose29@aol.com
  • STATEN ISLAND
  • NJ
  • In Northern NJ and can also be available to travel to shore points above GSP exit 100. Good with elderly and children, shelters, food distro., etc. @joanschulhafer
  • LONG ISLAND
  • Able bodied man in Lindenhurst willing to help in person with efforts on LI. s end me a direct message @greenguy808
  • CONNECTICUT
  • @girmann in Hartford county - willing to help.
  • TRANSLATOR/INTERPRETER OF SPANISH AND PORTUGUESE AVAILABE TO VOLUNTEER-ASSIST IN NEW HAVEN CT and surrounding areas WWW.BALDWINLINGUAS.COM 203-759-8352 << thx!
  • UPSTATE NY
  • If you need help in Albany, NY I'm here! @lego606
  • I am @RixeyBrowning located in the Poughkeepsie area, I am an EMT-B and can speak Spanish, my partner is a street medic. Heading down to NYC today to see what we can do.
  • MISC
  • Anything else I can do from here let me know! @maddiesully
  • Will be stateside in 12 days approx. Hard hit areas with little relief I'll come to with clean water, blankets, canned food. Let me know areas needing assistance @davidlasher or davidlasher.us/contact

NEEDS "I need help with..." (don't forget contact info!)
  • MANHATTAN
  • @CheshireAndrea We need someone in lower Manhattan to take a home bound paraplegic some distilled water & 2 car batteries.
  • BROOKLYN
  • Park slope food coop has 3 boxes of apples to go to red hook initiative. traffic is terrible - anyone with a bike that could carry a box there? @jhollar
  • QUEENS
  • The Rockaways need hot food, water, warmth - no other agencies like Red Cross, etc are there!  
  • BRONX
  • STATEN ISLAND
  • 911 is swamped, want people to know that Grant City in Staten Island is completely flooded. I am trapped at 220 Adams Ave on the 2nd floor with about 10 people including elderly and children. The first floor is flooded and all cars are underwater. We are calm, but boats and any kind of help would be good. Power is also out. URENT, POSTING FOR A FRIEND, CAN ANYONE HELP THESE PEOPLE PLEASE << can you give some contact info so I can help? -@justinwedes << this looks tto be same NEED as  https://twitter.com/jopoduimom/status/263120618294226944, going to investigate now <<HAS THIS NEED BEEN MET? Please confirm
  • Urgent per residents interviewed on CNN: emergency shelters are running out of food; dead body count at 14 so far but expected to be higher as many, many homes are collapsed and have not been explored yet.
MISC
  • Manhattan Beach needs hot food, water, warmth - no other agencies like Red Cross, etc are there!  

Other Volunteer Opportunities:
  • NATIONAL
  • NEW YORK CITY (General)
  • Shelter volunteers, volunteer 4 hours of your time: Jahmila Joseph, of Public Advocate's officer, seeking volunteers in city shelters. Fill out this form: http://bit.ly/volunteer-sandy or email jjoseph@pubadvocate.nyc.gov
  • MANHATTAN
  • BROOKLYN
  • Brooklyn Bridge Cleanup (Wed October 31, 9am-12pm + 2pm-5pm), rvsp: sward@brooklynbridgepark.org
  • John Jay High School (evac shelter) volunteers needed, 6-8hrs
  • Park Slope Armory (medical/frail shelter) volunteers needed, 6-8hrs
  • QUEENS
  • STATEN ISLAND
  • NJ
  • LONG ISLAND
  • UPSTATE / HUDSON VALLEY
  • (Other cities, Nov 3rd meetings via CrisisCommons)
  • BOSTON
  • DC
  • PORTLAND, OR
  • AUCKLAND ZEALAND
  • GALAWAY, IRELAND
  • SAN FRANCISCO
  • SEATTLE

Other Places to Seek Assistance:

Donations:

Helpful apps!:

Animal Rescue:

Other Resources:
  • includes drop off locations for donation items
  • Facebook page:
  • Twitter:
  • @OccupySandy
  • @Occuweather << live tweets from a recovery boat near Chelsea Pier
  • @TrickorAid
  • @HC_Sandy (run by allies of @OccupyPolice)
  • @OccupyWallStNYC
  • @350
  • @NYCMayorsOffice
  • @globalrevlive
  • @SIrecovers (Staten Island recovery hashtag)
  • Storify:
  • Maps
  • Maps of incidents / help needed:
  • Map of shelters:

#HurricaneHackers
  • Coordination
  • Twitter: @hurricanehackrs
  • email list: hurricanehackers@mit.edu
  • Hashtag: #hurricaneHackers
  • Key Links:

Neighborhood.recovers.org sites (also mentioned above):

*****************
This is the HurricaneHackers link list

Front Page Hurricane Hackers. Github code base HurricaneHackers.

****************

The EFF is fighting for open internets - this is exactly why: the Net access right now is fucked up and bullshit.

Why We Have An Open Wireless Movement | Electronic Frontier Foundation

Why We Have An Open Wireless Movement - OpenWireless.org

EFF believes open networks are crucial in hurricane-affected areas

Update: In response to the impact of Hurricane Sandy, Comcast is opening its XFINITY WiFi hotspots to non-Comcast subscribers in PA, NJ, DE, MD, DC, VA, WV, MA, NH and ME until Nov. 7. Users should search for the network "xfinitywifi" and click on "Not a Comcast subscriber?" at the bottom of the sign-in page. Users should select the "Complimentary Trial Session" option from the drop down list. TheOpen Wireless Movement thanks Comcast for helping out!

In troubled times, it's important to help each other out. Right now, we're witnessing an unprecedented hurricane hitting the Eastern Seaboard of the United States, and the ensuing damage and power outages are crippling rescue efforts, businesses large and small, and personal communications.

Communication is critical in time of crisis, and the Internet allows for the most effective way of getting information in and out. With readily available networks, government officials could use tools like Twitter to quickly spread information, citizen reports could help focus assistance where it is needed most, and social media updates could help reassure friends and loved ones—keeping mobile phone lines open for emergencies.

To take advantage of the Internet, people should not have to attempt to skirt restrictive Terms of Service to attempt to tether their smartphones. And tethering would not be necessary if there were ubiquitous open wireless, so that anyone with a connection and power can share their network with the neigborhood.

Last year, we wrote a post titled "Why We Need An Open Wireless Movement." Today, EFF is proud to announce the launch of the Open Wireless Movement—located at openwireless.org—a coalition effort put forth in conjunction with nine other organizations: Fight for the Future, Free Press, Internet Archive, NYCwireless, the Open Garden Foundation, OpenITP, the Open Spectrum Alliance, the Open Technology Institute, and the Personal Telco Project.

**********

Here is the big ol index from HurricaneHackers: Linklist - Google Drive

   

#HurricaneHackers: Home | Linklist | Projects | Github | IRC


HurricaneHackers - link list for #Sandy emergency resources & more

*

#HurricaneHackers: Home | Linklist | Projects | Github | IRC

HurricaneHackers - link list for #Sandy emergency resources & more

Communicate w/ No Cell Service http://opengarden.com http://hackerdemia.com

Maps

System

Wind

Water

Evacuation

Official Data

Forecasts

Models

Images

Historical Hurricane Data

Miscellaneous

Crowdsourced Data

Ushahidi/Crowdmap

Streams

Amateur Radio

Images

Social Media

Aggregators

News / PSAs

Governments / NGOs

Important Articles / Posts

Twitter

Code / APIs / Repositories

Social Media

Timelines

#hurricanehackers Coordination

#HurricaneHackers key links:


Communicate w/ No Cell Service http://opengarden.com http://hackerdemia.com

Maps

System


Wind




Water


Evacuation



Power

Needs/Supplies:

  • Red Hook Initiative – Texting Needed Supplies to Collaborative Map (@jrbaldwinn):
    • TEXT Hurricane Needs to: (347)778-0570
    • Format by: Need @ Location i.e. "Gas, Water Pump @ Van Brundt and Pioneer Brooklyn"
    • Auto populates map data here for responders: https://rhiwifi.co/hurricane/

Official Data

Forecasts

  • NOAA/NWS Seven Day forecast including hourly output and current watchocation. link
  • WUnderground state-by-state breakdown: http://goo.gl/hDD1N

Models

Images

http://tinyurl.com/hurricaneSandyNRL2


Storm Briefings
NWS Office Philly

Transitioning from hurricane to Post-Tropical Storm
Topics : How, When, Why weather advisories will come from as the storm goes through Frankenstorm mode
http://www.nhc.noaa.gov/news/20121027_pa_sandyTransition.pdf

Historical Hurricane Data

Miscellaneous

Crowdsourced Data

Ushahidi/Crowdmap



Streams

Amateur Radio


  • hurricane Watch Net: 14.325.00 MHz; 7.268 MHz; 3.950 Mhz

Images


Social Media


Aggregators



News / PSAs

Governments / NGOs


Important Articles / Posts


Twitter


  • #Sandy, #ZoneA, #Frankenstorm, any other hashtags popular?
    • Boston: #BoSandy
    • New York: #NYSandy, #NYCSandy
    • New Jersey: #NJSandy
    • Virginia: #VASandy
    • Pennsylvania: #PASandy
    • New Hampshire: #NHSandy
    • Maine: #MESandy
    • Richmond: #SandyRVA
    • Maryland: #SandyMD
    • DC: #SandyDC
  • Matt Noyes, NECN meterologist : https://twitter.com/MattNoyesNECN ; has technical livestreams here: http://goo.gl/0oTf7
  • FEMA Administrator: https://twitter.com/craigatfema
  • NY Scanner: https://twitter.com/NYScanner

Transportation

Code / APIs / Repositories

Social Media

Timelines

#hurricanehackers Coordination


#HurricaneHackers key links:

  1. Index: http://bit.ly/hh-index
  2. Linklist: http://bit.ly/hh-linklist
  3. Projects: http://bit.ly/hh-projects-read
  4. Lulz: http://brownbag.me:9001/p/sandylulz
  5. Chat: IRC, Freenode, #hurricanehackers: http://irc.lc/freenode/hurricanehackers

***********

Top Tips for Using Social Media for Local Community Disaster Recovery - Google Drive

DRAFT - Top Tips for Using Social Media for Local Community Disaster Recovery

Drafting led by Steven Clift, E-Democracy.org
Join our Neighbors Online Webinar on Nov. 14

What can you do with social media and online tools for your neighbors who make up your local community?

As we move from emergency response to long-term recovery, here are some collective tips from the “locals online” community (join your peers for tips and advice).

  1. People matter more than tools. Don’t spend hours searching for the perfect tool, if you are willing to step up for your building, your block, your broader neighborhood or community, etc. it is your leadership that matters. Combining your willingness to digitally organize your neighbors with the best social media tools for you - be it compiling a cc: e-mail group of forty households or creating online groups using the latest social media tool for thousands - what matters most is your energy and dedication to reach out to your neighbors in every way possible. Be an e-leader for your community. You won’t regret it.
  2. Tools do matter. Pick your social media tools carefully and think about what your neighbors will actually use. Even if you are the right person with good communication skills and the ability to quickly establish trust among those neighbors you gather online, picking the wrong tool or relying on a single tool may not work. Just because a tool has great visual design or all the fancy features does not mean it will work with people stuck on smart phones for example who just prefer to use e-mail, Facebook, etc.
  3. Gather email addresses, mobile phone numbers, and other contact information first. Having email addresses and mobile phones numbers in your possession allow you to actively reach people. The ability to “broadcast” to your nearest neighbors with full control over when, who, etc. matters particularly if you want to reach older residents who do not “live on Facebook.” With complete control over the distribution of important information, this allows you to use different tools and approaches without being locked in by a single website. Here is a paper sign-up template you can adapt.
  4. Connect people horizontally by creating an online group for your local building/block/neighborhood/community. Name it by your place generally so it can last over the long-term as a space for neighbor connecting so you are better prepared for the next disaster. Invite people to join - often in-person, on paper flyers, etc. as well as online. Remember that the technology is the easy part. Be as inclusive as possible and don’t forget renters and lower income residents. Here are some tools to review (someone please draft and a add link). Note: Some neighborhoods still have thriving YahooGroups from a decade ago, a local “place blog” with an active web forum, etc. - join forces with them rather than recreating the wheel. Do a quick search (links to come). Some tools:
    • Facebook Groups: If you want to use Facebook, create a Facebook Group not a Facebook Page. Facebook Pages are a terrible tool for sustained group communication. Note that at about 150 members in a group, Facebook switches the default email notification setting to only send you notices when your friends posts. This is a negative, but Facebook is still a good way to quickly gather people online. You can always add the use of other tools later. Facebook Groups are better for smaller areas, but don’t scale well “community participation” wise because of the hidden notification issue. Two more concerns - the public officials you want to respond to your exchanges are often blocked from social media at work and by choosing Facebook at the core you’ve eliminated half the Internet users over 50. If you have older folks on your block that you want to include, this means you need to reach then another way. Therefore do not underestimate the simple power of an effective email list to break through computer firewalls.
    • E-mail lists: YahooGroups, Google Groups, and more. Note that you need to use tools like Mailman or others IF you want to be able to use paper sign-up sheets as the big online hosts no longer allow you to “add” people. Now you may only invite them which means lots will not click on the confirmation link. For a “social media maven,” paper sign-up sheets for e-mail lists may seem old fashioned but this is exactly what the Presidential campaigns do - collect e-mail and Zipcode everywhere and then communication build from there. They wouldn’t do it if it didn’t work. E-Democracy goes door to door with the neighbors online efforts in St. Paul. It works to reach lots of people who aren’t already among the most wired or most socially connected.

    • NextDoor, .St, Others
  5. Pick your scale and openness. You need to decide if you want to organize 30 households or connect an area with hundreds or thousands of residents. At the building or block level you probably want private online spaces while covering full neighborhoods you want to be far more open and inclusive. You want your public exchanges to be easy to find and open to local community organizations, places of worship, local businesses and government. You are all in this together and private resident-only spaces covering population areas over ~1000 residents will absolutely limit your success and potentially lead to greater community conflict. If you are are focusing on your nearest neighbors ovef a few streets or in your building, here is a rough Google Doc template you can copy and adapt or view as a sample form.

  1. Twitter can be useful for spontaneous networking and quick dissolution of group connections. On Twitter use hyper-local hashtags using #place or #placeXX at a level that isn’t too local so you can reach a critical mass and not so large that it is not useful for exchange.

  1. Specialty Tools for Response/Recovery: Recovers.org, Ushahidi

  1. Interaction matters. The government and media will feed you lots of one-way information, but when it comes to very local information your neighbors are both the producers and consumers. No matter the tool, the key is email notification where participants can at least be told about what's new and better yet publish via e-mail as well to the community. If you are going to be that local e-leader, the most important thing to do once you choose your tool is to organize people and spread the word in-person.
  2. Add you own, re-order, etc.



This article is informed by E-Democracy.org 18 years of experience with local online community building including our failed experience with support local “neighbours forums” in Christchurch, New Zealand after there big earthquake. In short, supporting two regional volunteers we skipped our “you must have a local volunteer forum leader and 100 initial members in place to open” requirement. The desperate need for communication to assist community recovery did not generate local volunteers even with 1000 participants recruited but spread out over 25 forums. So, in short the real world lesson is that no block, building, neighborhood or community will successfully connect in a trusted community building manner without at least one person in that area stepping up an an authentically local leader.

*****************

Anyway hope this helps!! Good luck folks.

"Warning shot will not be fired" by MPs trained in Martial Law in America: Military Police training: heavily patrolled domestic detention facilities, dissident/sniper warrantless searches - CONPLAN 3502 Civil Disturbance Operations training @ Ft McClellan

b. Use of Deadly and Non-deadly Force (4) (b) Warning shot will not be fired.

or better yet:

(3) In an occupied building, when the dissident's/sniper's location is unknown, all suspected rooms must be searched. The action element should try to have occupants submit voluntarily to the search of their rooms. At the same time, occupants should be questioned in an attempt to pinpoint the sniper's location. If occupants will not submit voluntarily and there is probable cause to believe that the dissident/ sniper is located in the room, a complete physical search of the room or rooms should be conducted. Use of the patrol dog will help in conducting such searches.

Another planning layer for emergency domestic military operations has been published: The 2006 US Army Military Police training manual for Civil Disturbance Operations does not concern itself with warrants in the 'search' section, indicating a certain level of Constitutional disregard in the military's planning for emergencies in what the document calls CONUS, or Continental United States.

The excellent PublicIntelligence is where this just popped up (first I saw of it anyway): U.S. Army Military Police School Civil Disturbance Operations Course | Public Intelligence - Direct PDF link (115 pages).

martial-law-mp-training-front.png

///////UPDATE JULY 11: Just talked with Alex Jones for an hour on this stuff. Here's the crib notes & PDFs you'll want to see.
/////// UPDATE July 7 AM: My interview with Darren McBreen on Infowars Nightly News: http://www.youtube.com/watch?v=fNw_m7gfqXM // Prisonplanet stories by Kurt Nimmo and "Army Manual Outlines Plan To Kill Rioters, Demonstrators In America" by Paul Watson.. Also I put it on Reddit One & Two

///////

I've only had time to read a bit of it so far, but it ties in very closely with another level of this planning framework, USNORTHCOM (Northern Command) CONPLAN 3502 Civil Disturbance Operations, which is the 21st century replacement for GARDEN PLOT, the Pentagon's plan used between the 1960s and 2002 for domestic riot control & emergency operations in such settings as the LA Riots.

In 2010 I found presentation files on a US Army Corps of Engineer server - for full story please see TC Indymedia Exclusive: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed. Having seen first hand domestic military operations at the 2008 Republican National Convention & 2009 G20 Pittsburgh, the growth and use of domestic military capacity for crowd control is a more-than-hypothetical situation -- and the subsequent obfuscation of those operations by political officeholders and appointees is quite terrifying in its implications.

This Civil Disturbance Operations Subcourse training manual ties right into material cited in the CONPLAN and supporting documents, including many of the same riot control weapons. An earlier version of a very similar manual can be found via that link.

martial-law-crowd-army-weapons-mp.png

Plus this one has quizzes!!

Billeting - I swear I heard something about revolutionaries complaining about billeting earlier... Something everyone makes a big deal out of this time of year....

There is a lot of stuff about formations -

P 62: Handy tip that rioter-impressing safe-port position is a PSYOP and tiring!

(a) The safe-port position is extremely useful in making a show of force before rioters. The above mentioned carrying position is the primary method of carrying weapons in the control force formation. It allows the Soldier to control both ends of the weapon while moving in and out of the formation and advancing the crowd.

All the stuff about gathering intel against rioting/unlawful Americans is nice and creepy and they definitely aren't saying anything about the Defense Intelligence Agency or National Geospatial Intelligence Agency.

[.............]

b. Collection.

(1) Military information elements having counterintelligence resources will maintain the ability to collect civil disturbance threat data during the period in which there is a distinct threat of actual civil disorder requiring the use of federal military forces.

(2) On activation by the Department of the Army, military intelligence elements having counterintelligence capability will:

(a) Establish and maintain contact with suitable local, state, and federal authorities.

(b) Collect civil disturbance data concerning incidents, and estimate the capability of civil authorities to control the situation. This can be achieved through direct contact with civil authorities.

(c) Report collection results to the Department of the Army in accordance with current plans.

(d) Keep appropriate commanders informed. (e) Provide intelligence support to the Personal Liaison Officer Chief of Staff of the Army.

(f) Recommend methods of overt collection, other than liaison, if required, to the Department of the Army for approval.

(3) Military intelligence elements may employ methods of collection other than liaison only on order of the Department of the Army.

(4) Covert agent operations are not used to obtain civil disturbance data on persons or organizations without specific advance approval of each operation by the Under Secretary of the Army.

(5) Basically, the following vital elements of data will be required for sound planning and operations once approval has been received:

(a) Objectives of elements which are a distinct threat to cause or are causing civil disturbances.

(b) Times and locations of disturbances.

(c) Cause of disturbances.

(d) Existence of persons, groups, or organizations which have distinctively threatened or are creating disturbances.

(e) Estimated number of persons who will be or are involved in civil disturbances. (f) Assembly areas for crowds.

(g) Presence and location of known leaders and persons who are a distinct threat to cause civil disturbances.

(h) Organization and activities planned by the leaders who are a distinct threat to cause civil disturbance.

(i) Source, types and locations of arms, equipment, and supplies available to the leaders who are a distinct threat to cause civil disturbance.

(j) Use of sewers, storm drains, and other underground systems by the elements who are a distinct threat to cause or are causing civil disturbances.

(k) Identification of new techniques and equipment not previously used by elements that are a distinct threat to cause civil disturbances.

(l) Attitude of general masses towards: (a) Groups causing civil disturbances. (b) Civil law enforcement authorities. (c) Federal intervention to control the disturbance.

(m) Possible threat to public property including private utilities. (n) Communications and control methods employed by elements referred to in paragraph 1 above.

PART C - Request for Federal Support/Training 1. Request for Federal Support.

a. Providing military support to state and local governments to assist them in quelling a civil disturbance or riot requires close coordination through a host of state and federal agencies. It requires a though briefing of Soldiers at all levels on what they can and cannot do with respect to law enforcement. Civil authorities must be briefed on the restrictions placed on federal forces by the Constitution of the United States, federal statutes and laws.

b. Under the Constitution of the United States and United State Codes the President is empowered to direct federal intervention in civil disturbances to:

(1) Respond to state request for aid in restoring order (2) Enforce the laws of the United States. (3) Protect the civil rights of citizens (4) Protect federal property and functions.

c. The Secretary of Defense retains approval for federal support to civil authorities involving the use of DOD forces, personnel, and equipment. The Secretary of the Army is the Department of Defense executive agent is the approval authority for federal emergency support in response to natural or man-made disasters (except weapons of mass destruction [WMD]). The Directorate of Military Support (DOMS) plans and executes the DOD domestic support mission to civil authorities. The DOMS is the DOD primary contact for all federal departments and agencies during DOD involvement in most domestic support operations. DOMS is also the staff agency responsible to the Chief of Staff, Army and Secretary of the Army for recommending to them appropriate measures necessary to cope with civil disturbances and terrorism and to transmit the approved recommendations to Department of Defense agencies for execution and to supervise the execution. The missions and functions of DOMS are outlined in AR 500-50. Additional roles of responsibilities of various agencies can be found in FM 3-19.15

Prior to activating federal military forces there is a sequence of steps that must occur. When data begins to show that a disturbance may develop into a situation that will require the help of federal forces, several actions are introduced at the federal level while state and local law enforcement agencies attempt to contain the disorder. Such actions may include increasing the readiness posture of forces named to help the jurisdiction concerned.

d. As the situation worsens and the state employs its National Guard, the U.S. Attorney General would send his personal agent to the scene of the disorder. This agent is named as the Senior Civilian Representative of the Attorney General (SCRAG) and is the organizer of all federal activities in the area of the disorder, including contact with local civil authorities. At the same time, the Chief of Staff of the U.S. Army would send his personal liaison officer (PLOCSA) to the scene along with members of the Department of the Army Liaison Team (DALT) that serves as his planning staff.

[.........] CROWD CONTROL PAGE 35+

c. Techniques for Crowd Control. There are numerous techniques designed to provide the commander with flexibility of action in accomplishing crowd control. He must select a combination which will produce the desired results within the framework of the selected crowd control option. The most common techniques appropriate for military usage are discussed below.

(1) Observation. This consists of deployment of persons or teams to the periphery of a crowd for the purpose of monitoring its activity. It includes gathering data on crowd size, location, mood, and reporting on the developing situation. This technique includes posting persons on strategic rooftops and other high terrain overlooking the crowd. This latter measure provides additional security to control force personnel should they become committed to other crowd control operations. Such a team may be composed of an expert marksman, a radio operator, and an observer equipped with binoculars. Care must be taken to assure that committed control forces are aware of the locations of such teams to prevent their being mistaken for sniper elements.

(2) Communication of Interest and Intent. In certain situations, effective communication with crowd and mob leaders and participants may enable the commander to control the situation without resorting to more severe actions. When planned and organized demonstrations, marches, or rallies within the disturbed area are announced, the control force commander in coordination with local authorities should meet with organizers of the activity in order to communicate the interest of the control forces. The following matters, as appropriate, should be discussed.

(a) Parade or demonstration permits. (b) Location of demonstration and routes of march. (c) Time limits for the activity. (d) Provision of marshals by activity organizers. (e) Prevention of violence. (f) Safety of all concerned.

(3) The task force commander and local authorities should also communicate to the activity organizers

their intent to cope with violence, unlawful actions, and violations of restrictions imposed on the activity. It is intended that, by this communication between activity organizers and control force personnel, the demonstration, rally, or parade will occur without incident through the mutual cooperation of all concerned. The intentions of control forces will not be effective if delivered as an ultimatum. A limited, begrudging dialogue with activity organizers reduces the opportunity for authorities to learn the plans of the demonstrators. It must be remembered that if this communication is not effected, the activity organizers might well hold the demonstration in defiance of local authorities, thereby creating a potential for violence that might not have existed if this technique had been employed.

d. Channelization. Pressure can be brought to bear on the dissident leadership to channel the crowd into an area which will minimize the disruption when the following requirements are met:

(1) When communications have been established with the dissident leadership.

(2) When the intent and nature of the crowd activity is known.

e. Diversion. When communication exists with the dissident leadership, consideration may be given to efforts to divert the leadership of the crowd itself from its stated or obvious objective. The diversion should support the objectives of the control force either by reducing the strength of the crowd situation or motivating the crowd to seek an area more easily controlled by the control force.

f. Cooperation. Decreasing the potential disruption of the crowd activity may be accomplished by an active attempt on the part of the control force to obtain cooperation of the dissident leadership. Whenever there is an attempt by the crowd leadership to seek permission and cooperation of the local government, every effort should be made to maximize this cooperation by demonstrating an attitude of facilitation. This may be accomplished by helping the leadership to organize a peaceful demonstration while establishing guidelines which will minimize the impact of the demonstration on the community.

g. Selection of Force Options.

(1) The commitment of federal military forces must be viewed as a drastic last resort. Their role, therefore, should never be greater than is absolutely necessary under the particular circumstances which exist. This does not mean, however, that the number of Soldiers used should be minimized. The degree of force required to control a disorder is often inversely proportionate to the number of available personnel. Doubts concerning the number of Soldiers required should normally be resolved in favor of large numbers since the presence of such large numbers may prevent the development of situations in which the use of deadly force is necessary. A large reserve of Soldiers should be maintained during civil disturbance operations. The knowledge that a large reserve force is available builds morale among military and law enforcement personnel and helps to prevent overreaction to annoying acts by unruly persons.

(2) In selecting an operational approach to a civil disturbance situation, the commander and his staff must follow the "minimum necessary force" principle; for example, crowd control formations or crowd control agents should not be used if the area filled with manpower would be sufficient.

(3) Every effort should be made to avoid appearing as an alien invading force and to present the image of a restrained and well-disciplined force whose sole purpose is to help to restore law and order with a minimum loss of life and property and due respect for those citizens whose involvement may be purely accidental. Further, while crowd control personnel should be visible, tactical, or force concentrations which might tend to excite rather than to calm should be avoided where possible.

(4) The normal reflex action of the well-trained combat Soldier to sniper fire is to respond with all firepower available. In a civil disturbance, this tactic endangers innocent people more than snipers. The preferred tactic is to allow a special reaction team (SRT) who is trained for this type of mission, to enter the building from which sniper fire starts. Keeping with the controlling principle that the team must use only the minimum force necessary to fulfill the mission, the commander may select any one of the following options for arming his Soldiers:

(a) Riot Shield. In the hands of a well trained soldier, the riot shield can be utilized as both a defensive and offensive weapon when contact is made with an aggressive crowd. The primary use of the riot shield is for defense of the line. However, each riot shield holder must be proficient in its retention. The Soldier holding the shield must be trained to react when a demonstrator grabs the top of the shield by slapping with his strong hand and gives the following command" Get back", "Get away" "Stop". If a rioter grabs the bottom of the shield the Soldier should be trained in forcefully dropping to one knee and pinning the rioters' fingers to the ground.

(b) Baton. The baton is most effective in a crowd control operation and is considered the primary weapon for crowd control operations. The baton is considered to be an offensive weapon with reduced lethality and unlike the rifle, the loss of a baton to the crowd does not create a serious threat. Soldier must be trained with the riot baton to the point its various techniques are automatic to them. This training must also include the vulnerable points on the body so they can avoid areas that may cause permanent injury or death when struck.

Currently there are two types of riot batons, wooden and expandable. The most common one is the 36 inch hickory riot baton with thong. There is also the 24-inch to 36 inch expandable riot baton, which has been added to the nonlethal capabilities set. Each Solder within the control force need to be proficiently trained in all techniques for blocking and striking. Improper use of the riot baton by an untrained Soldier has the potential for creating a greater problem than what already exist.

(c) Shotgun. The 12 gage shotgun is a pump action shotgun currently in the nonlethal capabilities set (NLCS) inventory. The pump action shotgun is chambered to take up to 3-inch shells. The 3- inch chamber allows for the use of M1012 and M1013 NL munitions. This shotgun also provides a visually distinct alternative to the standard military issues weapon.

(d) Rifle. The rifle, if capable of automatic fire, must be modified to prevent automatic operation. Keeping with the controlling principle of using only the minimum force necessary to fulfill the mission. If the Soldier are equipped with their long weapons and are in the front lines of the formation, the weapon should be carried across their back from left to right with the muzzle of the weapon pointed down and the butt of the weapon pointed up. The weapon should be cleared and the magazine in the proper ammunition pouch.

(e) Non lethal weapons and munitions. Nonlethal weapons and munitions are an additional asset afforded to the commander in civil disturbance and are preferred over lethal force. The showing of force with nonlethal weapons and munitions may assist in crowd dispersing, separate, or leave the area with minimal causalities. This nonlethal capability set (NLCS) is a well-rounded, versatile package of both equipment and munitions. NLCS are dived into four distinct categories: personnel protection, personnel effectors, mission enhancers and training devices

(f) While each of the above options represents an escalation in the level of force, they are not sequential in the sense that a commander must initially select the first option, or proceed from one to another in any particular order. So long as the option selected is appropriate, considering the

existing threat, the minimum necessary force principle is not violated.

1. The rifle and rifle with bayonet attached have extremely limited offensive use as both may constitute deadly force. The primary value of the rifle or the rifle with bayonet attached is the psychological impact on the crowd. While the use of fixed bayonets can add considerably to this effect, the danger of intentional or accidental injury to demonstrators or fellow control force personnel prevents such use except with extremely violent crowds.

2. Fire by selected marksmen. Fire by selected marksmen may be necessary under certain circumstances. Marksmen should be pre-selected, trained, and thoroughly instructed. They may be placed on vehicles, in buildings, or elsewhere as required.

3. Full firepower. The most severe measure of force that can be applied by Soldiers is that of available unit firepower with the intent of producing extensive casualties. This extreme measure would be used as a last resort only after all other measures have failed or obviously would be impractical, and the consequence of failure to completely subdue the crowd would be an imminent overthrow of the government, continued mass casualties, or similar grievous conditions.

4. Shotgun. The riot shotgun is an extremely versatile weapon; its appearance and capability also produce a strong psychological effect on rioters. It is particularly suited to certain applications in civil disturbance operations. When used with No. 00 buckshot ammunition, it is an excellent point target weapon extremely effective at limited range. By varying the nonlethal munitions' M1012 and M1013 the weapon can be employed with considerably less possibility of serious injury or death. This provides the commander with a desirable flexibility in selecting the ammunition most appropriate under the existing conditions

(g) The measures described in paragraphs 1 through 5 below, may be applied in any order as deemed suitable by the responsible commander as long as his application is consonant with prescribed confrontation management techniques outlined earlier.

(1) Proclamation. A public announcement is considered an excellent medium to make known to a crowd the intentions of the control force commander. In some cases, such an announcement makes further action unnecessary. An announcement puts the population on notice that the situation demands extraordinary military measures, prepares the people to accept military presence, tends to inspire respect from lawless elements and supports law-abiding elements, gives psychological aid to the military forces trying to restore order, and shows to all concerned the gravity with which the situation is viewed. In making a proclamation, a commander may consider imposing a time limit. However, the situation may change, and not imposing a time limit may leave the commander other options as he sees fit, as long as the proclamation is specific in its instruction.

(2) Show of Force. A show of force is effective in various situations in civil disorder control operations. A show of force may as simple as Soldier dismounting from buses or trucks in plan sight of the demonstrators, but must be far enough away to prevent a provoked attack of thrown objects. When a crowd has gathered in a large area, show of force can take the form of marching a well-equipped, highly disciplined control force into their midst. When persons are scattered throughout the disturbance area in small groups, a show of force may take the form of motor marches of Soldiers throughout the area, saturation patrolling, and the manning of static posts or similar measures.

(3) Employment of Crowd Control Formations. Crowd control formations are used to contain,

disperse, block or break up a non conforming crowd; these crowd control formations are more effective in urban areas than they are in open fields or parks. When this method is utilized in urban areas, it is easy to disperse or split the crowd into small groups, isolate instigators, or funnel a crowd into a desired area. The use of such formations is part of the show of force and has a strong psychological effect on any crowd.

(4) Employment of Water. Water from a high pressure hose may be effective in moving small groups on a narrow front such as a street or in defending a barricade or roadblock. Personnel applying water should be protected by riflemen and in some cases by shields. In the use of water, the factors discuss below should be considered.

(a) Water may be used as a flat trajectory weapon utilizing pressure, or as a high trajectory weapon using water as a rainfall. The latter is highly effective during cold weather.

(b) The use of a large water tank (750 to 1,000 gallons) and a power water pump mounted on a truck with a high pressure hose and nozzle capable of searching and traversing will enable Soldiers to use water as they advance. By having at least two such water trucks, one can be held in reserve for use when required.

(c) In using water, as with other measures of force, certain restraints must be applied. Using water on innocent bystanders, such as women and children, should be avoided; ways to escape must be provided; and the more severe use, flat trajectory application, should be used only when absolutely necessary.

(d) Fire departments are normally associated with lifesaving practices rather than maintenance of law and order. In order to maintain this image, fire department equipment will not be used for riot control and crowd dispersal.

(e) Use of Crowd Control Agents. Crowd control agents are extremely useful in civil disorder control operations because they offer a humane and effective method of reducing resistance and lessen requirements for the application of more severe measures of force. Task force commanders are authorized to delegate the authority to use crowd control agents and other forms of non lethal force at their discretion.

2. Establish Area Control.

a. General. Acts of violence, such as looting, arson, and vandalism, are greatly reduced when the physical and psychological influence of lawlessness is defeated. In establishing effective area control, commanders must recognize the problem of widespread looting and arson that has accompanied most large urban disorders. Performance of this task consists of reducing or eliminating those conditions which contribute to the outbreak or continuation of lawlessness in the disturbed area.

(1) Looting. When dealing with persons involved in looting, extreme care and adherence to the principle of minimum force must be observed. Looting may start at any time or place as an isolated incident and spread quickly throughout the affected areas. Looting is not limited to any particular sex or age group; it includes the very old, the very young, women, and children. For example, many children may be looting without any idea of how serious their actions are. In the control of looting, unit leaders must recognize that deadly force is not authorized.

(2) Anti-looting. Unit commanders must be familiar with anti-looting measures which can be taken by civil authorities, such as boarding up broken or unbroken windows, covering windows with photo-

luminescent particles, and by the prompt posting of looting penalty proclamations. Anti-looting actions that can be taken by military forces include the establishment of foot and motor patrols, the posting of fixed guard posts, and the lighting of likely areas for looting. Guards at fixed posts will be briefed not to leave their posts to pursue individual looters on foot, but to remain on post and prevent looters from approaching their areas of responsibility. All guards must be briefed that looters will not be fired upon nor will deadly force be used to catch looters.

(3) Protected or Sensitive Commercial Establishments. A main consideration in the conduct of civil disturbance operations is to prevent liquor, drugs, weapons, and ammunition from falling into the hands of rioters. Therefore, liquor stores, drug stores, sporting good shops, pawn shops, and hardware stores are main targets for looters and must be kept under close observation by means of foot and motorized patrols. Normally, businesses of this type must be identified in advance and included in emergency plans.

(4) Arson. Arson is generally defined as a crime of purposely setting fire to a building or property. Acts of setting fire to buildings, property, etc., often follow disturbances. Certain situations may arise in controlling arson where the use of deadly force is authorized and necessary.

[.........] PAGE 40

(2) Imposed Restrictions. Except in the unlikely event of martial law, federal military forces will not have the authority to impose restrictions such as a curfew on the civilian population. Certain restrictions, however, may be imposed by civilian authorities to help in the control of lawlessness. Military leaders should be prepared to recommend which restrictions are of substantial value in comparison with the burden of enforcement. The most commonly used restrictions include:

Curfew. The curfew is a control measure which has proved highly effective in many civil disturbances. Its purpose is to restrict the unauthorized movement of personnel on streets and public places during specified periods of time, especially during the hours of darkness. Joint planning with civil authorities regarding the imposition of a curfew should provide for:

(a) Coordination of the initiation, enforcement, and termination of a curfew.

(b) Public announcements of the beginning and ending of curfews. Civilian authorities make these announcements through local mass media, pamphlets, and public address systems to ensure maximum exposure.

(c) Curfew exemptions and guidance on who should receive them, including written authorization or passes.

(d) Provision for the apprehension and disposition of curfew violators.

(3) Sales Restrictions. Restrictions on the sale, transfer, and possession of sensitive material such as gasoline, firearms, ammunition, and explosives will help control forces in minimizing certain forms of violence. Limiting the availability of weapons to the potential sniper or terrorist may reduce the likelihood of such violence. The effective enforcement of these restrictions, however, requires extensive planning and the commitment of adequate manpower to this effort.

So much for the Second Amendment SUCKAZ....

[.........] PAGE 22+

f. Army Detention Facilities.

(1) The Army will not operate facilities for confinement, custody, or detention of civilian personnel apprehended for violation of local or state laws as long as civil confinement facilities, operated by the Department of Justice, state, or local agencies are sufficient to accommodate the number of persons apprehended.

(2) When it appears that available local facilities are insufficient, due to the large number of persons apprehended or detained, and this fact can be verified by the person or agency responsible for the facilities, temporary confinement/detention facilities may be operated with prior approval from DA, specifically, the Chief of Staff, U.S. Army. These facilities will be operated only until custody of the persons detained can be transferred to and assumed by civil authorities. They will not be used for the confinement of persons charged or convicted under civil jurisdiction.

(3) Temporary confinement/detention facilities can be developed from local federal facilities provided they are adaptable to the requirements of custody and control. Such facilities should be established, if possible, within the affected area; this will conserve time, transportation, and escort personnel.

However, if no suitable federal property is available within the affected area, they can be located elsewhere on any property under federal control as long as the persons to be detained are apprehended in the affected area. Whenever such temporary facilities are established during civil disturbance control operations, the Army is responsible for providing those personnel, facilities, and supplies necessary for the custody, control, health, comfort, and sustenance of persons detained.

(4) Officers and key NCOs specifically trained and experienced in confinement operations are required to operate such facilities. Guards and support function personnel operating under the direct control of such officers and NCOs need not be specifically trained or experienced in confinement operations as long as they are under close and continuing supervision of trained responsible personnel. Whenever females are detained, they must be held in physically separate detention facilities and under the control of selected female guards operating under the supervision of trained and experienced confinement personnel.

(5) Temporary detention facilities should be constructed and arranged to provide for adequate custody, control, and safety of detainees. It is advisable to use existing permanent-type buildings. Where sufficient permanent structures are not available, only that amount of new construction required for temporary custody, control, and administration of prisoners should be accomplished. Temporary field- type facilities provide compartments to assure effective control.

(6) The same operational procedures that apply to the operation of installation confinement facilities and treatment of detainees apply to these temporary facilities except that those policies and procedures establishing training, employment, mail and correspondence, and administrative discipline requirements will not apply. Detailed guidance in procedures for confinement of detainees is contained in EPW Operations, FM 3-19.40.

g. Special Equipment. Certain items of equipment available to military and civil police forces can do much to limit injuries to civilian and military personnel and destruction of property. These items increase the psychological effects of a show of force and offer additional protection and versatility to civil disturbance forces during the operations.

(1) The 12 gage shotgun is a pup action shotgun currently in the non lethal capabilities set (NLCS) inventory. The pump action shotgun is chambered to take up to 3-inch shells. The 3-inchchamber allows for the use of M1012 and M1013 NL munitions. This shotgun also provides a visually distinct alternative to standard military weapons that may be desired based on mission considerations.

(2) The shotgun, as in the case of other firearms used in civil disturbance operations, is fired only on the orders of a qualified superior officer when lesser measures of force are not effective, or when the individual Soldier has no other means of protecting his life.

(3) The M7 is a 66-millimeter vehicle-mounted NL grenade-launching device that is mounted on a HMMWV. It is a indirect fire support system that can deliver the M99 blunt trauma grenade that creates a sting-ball effect. The M315 installation kit is used to install an M7 discharger on the turret ring of appropriate HMMWV variants. An adjustable bracket allows the launch angle to be depressed for engaging targets at ranges of 50, 75 and 100 meters. The system enforces standoff distances and deters potential threats.

(4) The M1012 is a single projectile round made of hard rubber that is shaped like a bomblet and designed to be fired at a single target. With the muzzle velocity of 500 feet per second, the M1012 as the effective range of no closer that 5 meters and no further that 30 meters. Engagement inside of 5 meters could result in serious bodily injury or death. Beyond 30 meters the kinetic dissipates to the point where the round becomes ineffective.

(5) The M1013 is a multiple projectile round with .23 caliber hard rubber pellets that is designed to be fired at and employed with the purpose of affecting multiple targets. With a muzzle velocity of 900 feet per second, the M1013 has an effective range of no closer than 5 meters and no further that 30 meters. Engagements of less than 5 meter can result in seriously bodily injury or death. Beyond 30 meters the kinetic dissipates to the point where the round becomes ineffective

(6) The midsize riot control disperser (M37) is the size of a standard fire extinguisher that uses compressed air to force the RCA out to a range of 30 feet. It has the capacity to employ 18 burst of RCA into a hostile crowd while maintaining excellent standoff capabilities. The M37 can be refilled and is rechargeable. It can be refilled with CR solution (liquid agent) or CS (dry agent). For the purport of training the M37 can be filled with water and CS can be substituted with talcum power.

(7) The Squad riot control agent disperser (M33A1) is designed to provide crowd control and protection at the squad level. It is capable of projecting a ballistic stream of RCA's beyond 25 feet in up to 25 half- seconds burst. It consists of a frame and harness assembly, compressed-gas cylinder (agent container assembly) air pressure assembly, gun and hose assembly, multi-jet spray unit, and check valve assembly. The M33A1 can be refilled and is rechargeable. For training purposes, CR can be substituted with water and CS and be substituted with talcum power.

(8) The above mention items are but just a few of the non lethal weapons and munitions available to the commander and unit to utilize during a response to the civil disturbance, and can be utilized to train and prepare Soldiers. Additional non lethal weapons and munitions as well as protective gear can be found in FM 3-19.15.

3. Vehicles. Armored vehicles and transport vehicles add to the readiness of the crowd control force. The use of these vehicles increases flexibility, reduces troop commitments, and provides protection for personnel. In considering the use of vehicles, however, it must be remembered that they should be secured by foot elements.

a. Armored Security Vehicles (ASV) can be used in several ways to keep the effects of civil disturbances at a minimum.

(1) Their use adds a considerable psychological effect to riot control formations while providing added protection for Soldiers. They provide a readily accessible barrier for Soldiers to crouch behind if necessary, and excellent protection for those inside.

(2) Their use as mobile command posts offers the added advantages of security, communication, and mobility.

(3) They are well adaptable to roadblock operations providing the advantages listed above, while at the same time providing an excellent barrier.

(4) Their use for patrolling an area of violence adds to the psychological effect, and allows Soldiers to maneuver in close to snipers in order to make an apprehension.

b. Standard military transport vehicles can be modified with sandbags, armor plating, wire screening, or similar materials to give some protection against sniper fire and thrown objects. They provide mobility and communication capability for area coverage. Soldiers should be deployed with ample vehicles to provide sufficient flexibility to handle all situations in an area of civil disturbance. TOE allowances should probably be increased for this purpose.

3. Other Equipment. In addition to the special equipment discussed above, certain other items should be available for use in operations within the disturbance area.

a. Armored vests and protective masks are required for anti-sniping operations and at other times when violence is expected. Flexibility is an important consideration. For example, the limitation on visibility must be considered when requiring the use of protective masks, and the limitation on mobility when wearing the armored vests.

b. Successful conduct of the overall operation may depend on other items. Auxiliary lighting should be available to include hand-portable lights, vehicular-mounted searchlights, spotlights, flood-lights, flashlights, flares (with caution toward fires), and vehicle headlights. Prefabricated wood or metal barriers, or suitable materials, such as wire or ropes, may be used to block off an area; signs should be provided to supplement these barriers. Evidence equipment, including movie and still cameras with telescopic lenses, and recording devices should be obtained and placed into position.

c. Other items of equipment should also be provided. Helicopters should be used for observation, communication relay, illumination, resupply, reserve displacement, and numerous other tasks. Adequate firefighting and fire protection equipment are vital in civil disturbance.

d. Provisions should be made for appropriate communications equipment for use at the scene and between the scene and the operations headquarters. Every available means of communications to include public address systems--both hand-portable and vehicle-mounted--should be used.

PART E - Operational Tasks

1. General. In any civil disturbance operation, certain tasks must be accomplished to reach the ultimate objective of restoring and maintaining law and order. To do this, action must be taken to gain control of the situation. Control forces must perform certain tasks that will develop a physical and psychological environment which will permit law enforcement personnel to enforce the law and maintain order. The importance of having a high degree of flexibility and selectively in the response cannot be overemphasized. It is just as important that the tasks selected be completed only after a careful evaluation of the situation. This evaluation must consider the particular uniqueness of the situation. In this respect, the commander selects those tasks that are most likely to reduce the intensity of the given situation. Therefore, not all tasks will apply in all situations, but control force commanders and unit leaders must identify those tasks which must be performed and then develop plans and procedures for their accomplishment. The operational and integrated tasks listed below are discussed in detail in the paragraphs and lessons to follow.

a. Operational Tasks. (1) Isolate the area. (2) Secure likely targets. (3) Control crowds or mobs. (4) Establish area control. (5) Neutralize special threats.

b. Integrated Tasks.

(1) Gather, record, and report information. (2) Apprehend violators. (3) Maintain communications. (4) Maintain mobile reserves.

(5) Inform the public. (6) Protect the fire service operations. (7) Process detained personnel.

2. Isolate the Area.

a. This task includes the restriction and sealing off of the disturbed area. The objectives of sealing off the disturbed area are to prevent the disorder from spreading to unaffected areas, to prevent escape of persons bent on expanding the disturbance, to speed up the exit of the uninvolved, and to exclude unauthorized personnel from entering the affected area. In order to prevent the disturbance from expanding in size and strength, it is critical to prevent the inflow of extra demonstrators or curious onlookers into the disturbed area.

b. When military forces are committed to helping the civil authorities in controlling civil disturbances, the situation will be beyond the capability of local law enforcement agencies and a scene of major disorder should be expected. This disorder may be characterized by small, dispersed groups which are looting, burning, and generally causing havoc in the area, or it may be characterized by large groups participating in varying degrees of illegal conduct. The initial action taken by military forces to control the disorder is critical and should include the immediate isolation of the disturbed area.

c. The initial commitment of control force personnel may be required to clear a building or an area in order to isolate the persons creating the disturbance from those not yet motivated or actively involved. The primary emphasis should be on identifying what area and who has to be isolated.

3. Isolated Techniques. There are several techniques to use when isolating a disturbed area.

a. Barricades and Roadblocks. Barricades and roadblocks are physical barriers which deny or limit entry into and exit from the disturbed area. They can be used to totally deny passage of people and vehicles or to permit certain designated categories of persons and vehicles to pass. They must be positioned so as to prevent their being bypassed, surrounded, or cut off from support. In many cases, it may be impractical to physically seal an area due to the physical and geographical considerations, such as in the case of a college campus or a suburban area.

b. Barricades Against Personnel. Civil disturbance operations contingency planning should provide for the availability of portable barricades which slow down the passage of personnel. Concertina wire is a suitable material for rapid construction and effectiveness, although wooden sawhorses, ropes, and other field expedient devices may suffice. Concertina wire should be used sparingly and only under serious circumstances as it is indicative of violent disorders.

c. Roadblocks Against Vehicles. The erection of effective roadblocks which cannot be easily breached by vehicles requires large, heavy construction materials. One item that can be stockpiled in advance is 55- gallon drums to be filled with water or earth on site. Other materials include sandbags, earthworks, trees, or heavy vehicles. Several roadblocks placed at intervals of 25 to 50 feet provide sufficient depth to prevent breaches by heavy or high-speed vehicles.

d. Construction Considerations. The construction of barricades and roadblocks should provide cover from small arms fire where this threat is likely. Provisions should be for night illumination of approaches to the position; however, care must be taken not to silhouette the personnel manning it. Construction materials which would chip or shatter upon impact by thrown objects should be covered with canvas or sandbags to prevent injuries from flying fragments. Warning signs should be placed in front of the position directing authorized personnel not to approach the position. One technique of providing a quickly erected barrier is the use of vehicles parked bumper to bumper; however, this procedure may subject the vehicles to damage by a hostile crowd. Another device which may be effectively used both as a barricade and a part of a formation is the use of a locally built frame of wood or metal with wire covering.

e. Perimeter Patrols. Perimeter patrols should be established to prevent entry or exit from the disturbed area, particularly by persons or groups trying to bypass barricades and roadblocks. These patrols operate along the outer operational boundary of the disturbed area. Perimeter patrols can be integrated with area patrol routes within the disturbed area.

f. Pass and Identification Systems. Unit, installation, or municipal contingency planning should include a pass and identification system providing for the entry and exit of authorized personnel to and from the isolated area. Procedures should be established for press personnel, emergency medical personnel, public utility work crews, and for any other personnel who have a legitimate purpose for entering and exiting the isolated area. Consideration must be given to those persons residing within the disturbed area who must travel to and from work. An effective pass and identification system requires careful and detailed planning as a contingency measure.

g. Public Utility Control. Ensure that civil authorities have established a means for controlling public utilities to include street lights, gas, electric, water, and telephone services so that they may be turned on or off to support the tactics employed by the control forces.

4. Secure Likely Targets.

a. General. Certain buildings, utilities, and services are critical to the economic and physical well-being of a community and require security to prevent disruption of essential functions. In addition, certain facilities and buildings have become symbolic targets to radical or extremist elements and should be identified and afforded protection with the priorities established. Among the likely targets to be attacked are control force command posts, billeting areas, and motor parks. Another potential problem in civil disturbance operations is the threat posed by dissident elements intent on doing bodily harm to control force personnel and civilian dignitaries in the disturbed area. When such threats exist, military personnel may have to be committed to security operations. In particular, security must be placed on armories, arsenals, hardware, and sporting good stores, pawnshops, and gunsmith establishments, or other places where weapons or ammunition are stored. To conserve manpower, consideration may be given to evacuating sensitive items, such as weapons from stores and storing them in a central facility. Priorities for physical security must be established to prevent waste of available forces on less important facilities or those which have their own physical security forces. The degree of security necessary to protect various buildings and utilities is determined by considering the following: [..............]

It goes on.... Again the page is here. I'll leave it here to get this posted now. Check it out and be sure to get a handle on CONPLAN 3502 and other aspects of domestic military operations planning frameworks -- when similar emergency/disaster scenarios happen (i.e. Katrina) you see military personnel acting like this...

REX-84 under Iran Contra was 'then', and 'now' a literal US Army war to save the criminal banks from angry mobs is basically what's planned. Under this plan a nation ripped off & crippled by LIBOR peta-scale financial scams leaves forces like the military on the hook for defending the organized ring of criminals operating banks, i.e. "services ... critical to the economic... well-being of a community". What is the Pentagon supposed to do about the fact that the critical infrastructure is often operated by the criminally insane -- the very people who have pushed the US most of the way to the point where terrifying emergency plans like those above spring to life? X-(

Wins in Minneapolis & Choppy seas indeed: Glowing Monsanto corn, Fukushima quake would make total Cesium northern hemisphere doom

EU bankfail as everyone relishes Spain's 'successful auction' - American bankfail continues as homeless spirals, inflation & money velocity drift

On the MN front, well the Occupy movement in Minneapolis really flushed out a lot of authoritarian over-reactions in the last couple weeks, starting with a haphazard police action slapping a KSTP photographer, arresting a dozen occupiers including an indy videographer (which the tut tutters ignore, etc). A meeting with the mayor and police chief was achieved. Videos & stills from the street incident by various folks including myself and roguemedia.org at youtube.com/hongpong & quickly circulated as far as Iran's state news service PressTV lol.

A few days later, Minneapolis City Council President Barb Johnson tried to sneak an unlawful resolution without any public notice, which would have instantiated shutting down many inalienable rights between midnight and 6 AM on Nicollet Mall and Peavey/Greenway/Riverside plazas etc., including my right to collect stories and media as a journalist, a proselytizer's right to preach the Gospel, a protesters right to protest, a homeless person's right to exist, etc., in the name of the hellish blandness demanded by corporate psychopaths who want peace & quiet and these damn kids off their publicly owned lawns. The Council kicked it to committee 9-4 after the mayor lobbied for the corrupt resolution.

For the moment, anyhow, this pushed Johnson from the perceived 'center' to the 'right' of the DFL-dominated city political continuum. With an embarrassing defeat for the mayor, with the high stakes Vikings Stadium deal to rail thru without a vote in Minneapolis on the rocks at the Capitol, and Barb's greasy Peavey Plaza plan whacked in at least one committee, it seems the wheels of shadiness have trouble turning when a little sand gets in the gears. (the next hearing is May 2nd or 3rd, this would be a public hearing for the public safety committee vote, don't have info on hand. see facebook.com/occupymn or occupyminneapolis.mn )

According to one source, Mayor Rybak & Johnson's defeat last Friday was enough to spur one pol to discuss finally taking on the city machine -- the notion is that this new shakeup could finally crack open some political space in Minneapolis for an alternative after years upon years of stasis and acquiescence to top-down control (on behalf of the big banks and police union types in particular).

If nothing else then, it shows that the Founding Feathers insisted upon enough cracks in the machine to get the sand into. They never really could guarantee that the machine would work, but it seems like the saving grace for the last week was basically our dwindling freedom to throw sand in the machine. Good times. Even in Big Stone County people are standing up against massive mining projects.

Kind of a linkdump to throw here. Let's roll...

Keiser Report: Vicious Circle of Bankster Huddles (E277) - RT video 25mins with Matt Taibbi, covers the glorious Warren Buffett's Wells Fargo ownership link re drug money laundering with Wachovia & 22 tons in cocaine at about 20 minutes.

I missed this article rounding out the Bank of America situation: Bank of America: Too Crooked to Fail. Taibbi addresses in the RT segment how to deal with breaking down complex financial crimes to a mass audience, and sycophant trends in the journalism industry... tough stuff especially when the blasé corruption of a whole generation creates a nice thick layer of cynicism which has to be pierced and/or eroded before a damn thing changes. My favorite angle is Bank of America manipulating London's LIBOR inter-bank interest rate to alter the $350,000,000,000,000 - yes $350 trillion worth of securities. [Everything is priced linked to LIBOR as a general index] More corruption: Yet Another Obama Big Lie: Mortgage Fraud Investigation Not Even Staffed « naked capitalism

Wanted Pakistani man surfaces in video - Asia - Al Jazeera English. Adnan Rashid another operative out and about to tangle with that Pakistani government the interventionists enjoy ragging on. Oh yeah... Iran war. No time for that, but the whole middle east geopolitical equation with Iran/Syria is like some damn junior-year daydream scenario of mine. It's just weird. (see one of my favorite pieces from the Mac Weekly 2004: Lunch Beyond Good and Evil: Around a Table with Michael Ledeen)

NATO Summit 2012 - Police State Chicago - YouTube - lol get ready, this is Lower Wacker Drive hehe...

dead honeybees in colony collapse studyMonsanto glowing corn; Honey has a sad. Monsanto got control of a bee research place to inject more disinfo in the discourse about that other colossal eco-collapse, I'm sure. Someone told me a good one about the time Monsanto tried to make a new variety of corn and it glowed. It was a huge failure and they went to some lengths to cover it up. I wonder what other freakish creations they've made?

Here is a nice study by two beekeepers and a Harvard man. www.bouldercountybeekeepers.org/wp-content/uploads/2012/04/Lu-final-proof1.pdf

Colony Collapse Disorder in bees triggered not just by pesticides, but also by GMO high-fructose corn syrup. NaturalNews can be a bit hippyish but overall its not a bad place to start & they catch decent stories as well as in-depth on the federal food & drug fascist network operations going on at the behest of the Big Ag cartel, the Chicago-based milk price fixing racket etc. "Data from this in situ study provide convincing evidence that exposure to sub-lethal levels of imidacloprid in HFCS causes honey bees to exhibit symptoms consistent to CCD 23 weeks post imidacloprid dosing," wrote the authors. "15 or 16 imidacloprid-treated hives (94%) were dead across four apiaries 23 weeks post imidacloprid dosing."

So the pesticides left over in the corn syrup wastes the bees pretty easily. Makes sense, but it sucks they are feeding bees pesticide-laden corn syrup to make cheap honey eh?

Fukushima kabewm: Massive industrial strength coverup. One good place to start: OpEdNews - Article: Is Fukushima's Doomsday Machine About to Blow? Look up Arnie Gundersen's videos, etc. Where are the EPA readings? Videos of people with 3x hazmat-triggering radiation levels in Los Angeles air filters. Vancouver etc., it's all hot now. Almost as horrible as the disfigured seafood coming out of the Gulf in droves nowadays.

Cancer studies gigafail as medical journals verified as mostly spam-laundering for spoofing FDA processes with new "intellectual property": Also, perhaps a bit dramatic but 88% failure rate is not acceptable, you chumps: Cancer industry total fraud exposed: Nearly all 'scientific' studies fail to be replicated. Roundup: Cell phone radiation and cancer: Just how much more proof do you need?

President of Iceland explains how to tell banks to go screw themselves and win yr country back! Proof positive we can defeat the bankster police state slavery policy through resistance and courage! Iceland's President Explains Why The World Needs To Rethink Its Addiction To Finance - Business Insider. "Recovering faster and more effectively" than any other economy -- by dumping bad debt, not backing up zombie banks! If you read one interview, it should be this one :) He even points out that BankBloat absorbs more useful tech people, IT, engineers etc., and when the banks collapsed, those people got productive jobs in the primary (or "real") economy, which picked up even more.

Funniest damn thing: this video I didn't bother to watch but the idea of ancient nephilim giants coming to eat frozen corpses in FEMA coffins is like some kind of prize achievement in conspiracy thinking. Madame Blavatsky would be proud of the mythological cuisinart going on here, and the tags are great too: FEMA CAMPS - People frozen and eaten? - YouTube. Why not?

ZBV Backscatter van coming to protests and Super Bowls near you: This has been out for a bit but not too high profile. Around the time of big Capitol protests in March 2011 I saw a weird tall van in Madison WI with California plates, parked among the state patrol & ranger types. It was not as wide as this van, but it sat lurking all night with some dude doing stuff, and the engine running... Something like an unmarked mobile command center or etc. Anyway: "ZBV" - Z Backscatter Van - YouTube

Islamic universalism, colonial divide & rule lecture: Hour+ video just posted with Dr Fouzi Slisli Islamic Universalism and Colonial Divide and Rule Policies.

College courses for slum dwellin IT guys: a cynical take but let's see: Top U.S. Colleges to Offer Free Classes Online

Assange, RT and a Hezbollah interview? There's a word for this: trolling. Here come the haters! Attacks on RT and Assange reveal much about the critics - Salon.com. Another review by Kevin Gosztola: About Julian Assange’s New Revolutionary Television Show | The Dissenter

Keep it classy, down with paganism! Rep. Mary Franson infuriated by Earth Day, calls it "Pagan holiday" [UPDATE] - The Blotter

FBI grabs Riseup server: Consequences spill over harming many legit organizations. FBI Seizes a Server Used by CLG's Webhoster in Bomb Threat Investigation | Citizens for Legitimate Government. Notably the FBI doesn't grab Google's servers physically - it's proof that the unbelievably reliable Riseup.net isn't playing the same game as the other guys. Official note: Server Seizure, April 2012 - help.riseup.net

Foreclosure mill: Moar fake vice presidents. Economy Watch - Inside the foreclosure factory, they're working overtime

Colombia Secret Service fail: reeks of covert ops. Didn't I post just before this happened that merging Homeland Security and the Secret Service was bad news?! Can this please somehow lead to the end of the war on drugs AND the end of the war on sex workers? CBS: At Least 20 Women Involved In Secret Service Prostitution Scandal - YouTube

Older stuff; TSA VIPR nightmare: The TSA's mission creep is making the US a police state -- Puppet Masters -- Sott.net // "Dominate. Intimidate. Control." - Reason. (James Bovard is a damn good libertarian writer, details without the usual fluff)

Meet the new DNA? Scientists create DNA alternative | The Raw Story. Well at least we know XNA will be the operating system of our hellish cyborg overlords. See also: [1204.4116] An existing, ecologically-successful genus of collectively intelligent artificial creatures. First line "People sometimes worry about the singularity" lolll...

Drug war aside, Backstrom as Elvis: Dakota County Attorney and dedicated drug-warrior James Backstrom will actually run away rather than answer questions about whether or not cannabis has been used as medicine for centuries. Try it, it's fun! Thus, playing a man felled by Big Pharma like Elvis makes sense. Well hat tip to Backstrom here: Dakota County Attorney By Day, Elvis By Night? « CBS. // The next sham in Minnesota, pretending Schedule I actually means "no medical use" for cannabis: HF2508 Status in House for Legislative Session 87 // A little essay: Let's Be Blunt: It's Time to End the Drug War - Forbes // 1989: Drug-money Launderers Cleaning Up With Cash - Chicago Tribune:

Leigh Ritch, convicted of drug trafficking in 1986, testified at his trial that he regularly moved hundreds of thousands of dollars in drug profits to the Cayman Islands with ease.

Ritch said he stuffed the money into suitcases and took it to the Caymans, where local banks charged a 1 percent fee for ``counting the cash,`` a euphemism for laundering. The banks then shipped the money to the U.S. Federal Reserve system, he said.

As U.S. officials successfully pressured Caribbean nations to curtail such practices, Panama, with a longstanding policy of allowing untaxed, numbered bank accounts and asking few questions, became the banking center of Latin America.

Man, European new world order eugenic bloodline types are the worst! And who worse than those maniacs in the Netherlands!? Queen Beatrix’s Brother-In-Law Calls For Mandatory Birth Control For The “Unfit” - Alex Jones. Classic 1984 clip of Prince Philip talking about humanity in "plague proportions." Damn reptilians! Why can't they just hang out in old castles and dine on human flesh like their forefathers? (yes really)

Propellerheads unite: The Doctor's Sonic Screwdriver is now a real thing of sorts (io9)

Rise of the drones: coming for a county cattle rustler near you! The Rise of the Killer Drones: How America Goes to War in Secret | Politics News | Rolling Stone

Romney's Mormon mafia on the rise? Courthouse News Service - Bain Capital management slaves say they were fired because they weren't Mormon. Ugh. Mitt Romney, American Parasite - villagevoice.

The Nation and its OWS VISA offer: Gawd what an eye roller. Don't these people understand VISA and compound interest are right at the core of the problem!? Lol at Adbusters. The Pitch: Move Your Money Relay | The Nation...

Show your support today for OWS's Move Your Money Relay by applying for The Nation Magazine Platinum Visa® Rewards Card from UMB Bank of Kansas City.

UMB is a small, regional bank recommended by the Move Your Money project, a project we support. When you apply for and use the Nation Magazine Platinum Visa® Rewards Card, the bank will donate $50 and a percentage of all your future purchases on the card to The Nation! .... The more of us who participate, the bigger the impact. Show your support today for Occupy Wall Street and The Nation magazine and Move Your Money!

This is worth its own post but.... yeah. Wow. Re: Battle for the Soul of Occupy | Adbusters.

More econ items: Chris Martenson: "The Trouble With Money" | ZeroHedge // Forget '5 Minutes To Midnight', We Are 'An Inch From War' | ZeroHedge // Guest Post: Floating Exchange Rates - Unworkable And Dishonest | ZeroHedge // The Risk Of 'Hot' Inflation | ZeroHedge

WOW:
2-Housing-Busts-President-Report-Real-Terms-2012.jpeg

Europe Drops Dismally Amid Deja Vu | ZeroHedge // Guest Post: Wages And Consumption Are Both In Long-Term Downtrends | ZeroHedge // Is The Real Indicator Of The Global Economy In Africa? | ZeroHedge // The Check Is In The Mail And Other Lies | ZeroHedge

Cool fallback plan bro: Guest Post: How States Can Protect Themselves From Financial Collapse | ZeroHedge: "States with heavy resources will be in a perfect position to decouple from the failing establishment and build their own systems (which is probably a main motivation behind Obama’s latest “National Defense Resources Preparedness Executive Order…). Step 5: Adopt Alternative Currencies... Provide for yourself and others what the mainstream system will not, and eventually, they will either have to conform to your logic, because it works, or, they will have to try and stop you with violence and expose their inherent tyranny, building greater resistance. In either case, you win." etc. neat!

Montana GOP gets the Iran Contra Psyop Treatment!: Bob Janjuah Dismisses Central Bank Independence Amid Monetary Anarchy // Guest Post: Fake Conservatives As Dangerous To Freedom As Obama | ZeroHedge -- an exciting account of shady lunatic operative Neil Livingstone and his Psyops guru buddy Paul Vallely electioneering around; Vallely's a co-writer of the infamous Michael Aquino tract "From PSYOP to MindWar: The Psychology of Victory".

Vallely has been posing locally and nationally as a Liberty Movement proponent with his organization “Stand Up America”, just as Livingstone and Zinke have been posing as Constitutional freedom loving traditional conservatives. Anyone who has studied the Cointelpro operations of the 1960’s and 1970’s would probably see a familiar pattern in all of this, but many Montanans I fear may not be quite so aware.

So Montana is in a pretty hard core situation with a ring of Ollie North types cutting a major move. Where else can we spot the template?

The Mother Of All Infographics: Visualizing America's Derivatives Universe | ZeroHedge // Fasten Your Seatbelts: High Frequency Trading Is Coming To The Treasury Market | ZeroHedge // Gravitation Returns As Apple Falls, Drags Everything With It | ZeroHedge // Italy Jumps On Nationalization Bandwagon: Tax Police "Seizes" 20% Of Second Largest Domestic Insurer | ZeroHedge // Viva Central Planning | ZeroHedge // electricity is deteriorating but it's worse for brokerages than anyone else?! All that wasted electricity - not to mention the talent as Iceland's five-term president described above. Yet Another Exponential Chart... And A Different Spin On "Keynesianism" | ZeroHedge. woww...

A little more grab bag action: Prison Planet.com » Climate Alarmist Calls For Burning Down Skeptics’ Homes - a good example of PrisonPlanet going slightly off kilter with their headline -- the decidedly reactionary writer Steve Swick says "let's let their houses burn" which is a really off-putting kind of statement, but it's not the same as 'burning down'. Let's lock PrisonPlanet's Watson and Zwick in a room for a while...

Bill Gates comic book: this guy... wow man, the Gates Foundation and the whole bit. Arggg.. This site is a little odd but they are having some fun with a new approach: The Daily Bell - Is the Vaccine Industry Beginning to Fail?

HOMELESS VETERANS: I just heard more info on this - BIG pdf report on CHALENG, a homeless coordination services project. More info: Project CHALENG - Homeless Veterans // www.va.gov/HOMELESS/docs/chaleng/CHALENG_Report_Seventeenth_Annual.pdf . United States Interagency Council on Homelessness | People's Advocacy Council // Opening Doors Across America | Take Action | United States Interagency Council on Homelessness (USICH). For every fraudulently conveyed mortgage and robosigned fake document, every eviction and foreclosure you get more homeless and an empty house (and a further depressed housing market).

THis is nuts: F-35 fighter jet's escalating costs are on Washington's radar - latimes.com

Looks cool - notes in MN: Global Robotics Innovation Park // Wedge Co-op warehouse employees unionize //

Homeland security story propagates: interestingly, a lot of people across the political spectrum picked up the post about Homeland Security Investigations (HSI) and their monstrous trucks. » Homeland Security Unveils Monstrous SWAT Trucks Alex Jones // SHTF411.com • SPECIAL RESPONSE TEAM RIDES..... // Full-Spectrum-Dominance.com | FSD.net // ConspiracyCulture.com // Resistor in the Rockies: Meet the new Boss in Town: ICE spawns - HSI Homeland Security Investigations // Special Response Team: Coming To A Neighborhood Near you, by Homeland Security | Decrypted Matrix // seeing is believing ....sit down - Back Country Rebels - Forums // Keep and Bear Arms - Gun Owners Home Page - 2nd Amendment Supporters // The republican Mother: This is how the government preps, you amateurs! etc. People seem instantly infuriated by the sight of those damn trucks!

Anyway that is it for now. Hope you enjoy zee ol linkdump!

Meet the new Boss in Town: ICE spawns... HSI Homeland Security Investigations, for great justice & cocaine cowboys

Now with moar National Intellectual Property Rights Coordination Center ... Security unit targets ‘worst’ in world crime - John Lantigua, Palm Beach Post, Nov 26 2011

HSI is a new directorate within the Immigration and Customs Enforcement service. Formed in September, its agents are responsible for investigating large-scale international crime, such as narcotics or arms smuggling, human trafficking, money laundering and any form of terrorism. They also defend against the illegal appropriation and exporting of technology that is crucial to U.S. security.

"In other words we're looking for illegal activity that is crossing the border into the country or crossing the border out of the country," Pino says.

The HSI Special Response Team serves warrants and apprehends international criminals considered too dangerous for other law enforcement to go up against.

"A lot of these criminal organizations are very well-armed, very well-funded and some of them may come from military backgrounds in their home countries," Pino says.

While its name is new, the response team can be traced to the 1980s, before the Department of Homeland Security existed.

"It started here in Miami, in the old cocaine cowboy days," HSI Special Agent in Charge Mike Shea says. "This is the oldest and best tactical entry team in the country. High-risk entry is the core mission."

HSI consists of more than 10,000 employees, including 6,700 special agents, who are assigned to more than 200 U.S. cities and 47 countries .

A relatively monstrous SWAT style truck leads us to a whole new blob of police state developments, busy hands with little to do and a lot of hardware to do it. It's yet another plateau of mad new security bureaucracy, something in this case I was loosely aware of tectonic plates moving, but a little digging revealed quite a nasty new nucleus. Let's plow in and see what was beta-tested through the willingness of politicians to throw money at repressing immigrants. The results begin with big, black scary trucks. And the biggest intelligence group inside the Department of Homeland Security (DHS), and more. Surprise!

Via CopBlock.org's Facebook page:

Homeland Security SRT riot truck

What in the hell is the Special Response Team, why do they have eight of these things? etc. What turns up is an entirely new nasty agency gestating with Immigration & Customs Enforcement, from the burbling mass of confused federal police... a new team emerges. With exciting competitions and lurid ways of guarding the Super Bowl from Terrorist Attack - a National Special Security Event. The wikipedia page outlines the bizarre weave of this particular bureaucratic nucleus. And the List of special response units on the ol Wiki shows a spreading motif -- but this Homeland Security super-swat is perhaps the swattiest of all.

HSI SRT Training to jump off shiny new helicopters to save the Super Bowl in Miami - yayyyy!!
(this is why your schools/bridges are crumbling, America, the purposeless authoritarian spectacle at its finest ;)

This recently reorganized, months-old ICE Homeland Security Investigations (formerly known as ICE Office of Investigations) should really be on the radar of anyone because this year they are apparently 'filling in the gaps for the Secret Service' at NSSEs like G20, NATO summits and the Republican and Democratic national conventions. (unfortunately the Secret Service is now a part of DHS, not Treasury.) The Federal Protective Service, which likes to take photos around the Twin Cities (see my 2010 Fort Snelling Undercover Fail video, classic times) is now part of some weird directorate but briefly passed through ICE after being removed from the General Services Administration.

The HSI Special Response Teams are seemingly the top layer of a lot of things, from the war on terror / war on drugs motif, to the Super Bowl, to whatever the hell they are planning to do to immigrants on the I-5 near LA, which was where this pic was taken according to Copblock. ICE has a large number of staff on the Joint Terrorism Task Forces that do statistic-generating police state busywork around the country, and interestingly this HSI group is now officially becoming publicly distinguished from the rest of ICE -- and the theory of course is HSI would be spun out of ICE to become a freestanding 'directorate', a more modern and insane paramilitary FBI or whatever.

I wonder if the Secure Communities biometric collection program which was forced upon all counties in Minnesota, regardless of state & local wishes, would feed citizens' data into HSI.... just like the monstrous truck above, now moving more into the "non immigrant" category of freeform federal police activity. Perhaps they shall do some serious black ops against occupier groups angling to get to the conventions? Nevar!

Wikipedia:

The Special Agents of HSI use their broad legal authority to investigate and combat a range of issues that threaten the national security of the United Statessuch as strategic crimes, human rights violations, human smuggling, art theft,human trafficking, drug smuggling, arms trafficking and other types of smuggling(including weapons of mass destruction), immigration crimes, gang investigations; financial crimes including money laundering, bulk cash smuggling, financial fraud, and trade based money laundering; terrorism, computer crimes including the international trafficking of child pornography over the Internet, intellectual property rights crimes (trafficking of counterfeit trademark protected merchandise), cultural property crimes (theft and smuggling of antiquities and art), and import/export enforcement issues. HSI special agents conduct investigations aimed at protecting critical infrastructure industries that are vulnerable to sabotage, attack or exploitation.[8] HSI special agents also provide security details for VIPs, witness protection, and support the U.S. Secret Service's mission during overtaxed times such as special-security events and protecting candidates running for U.S. president.

HSI was formerly known as the ICE Office of Investigations (OI). HSI Special Agents have legal authority to enforce the U.S. Immigration and Nationality Act (Title 8), U.S. Customs Laws (Title 19), along with Titles 5, 6, 12, 18 (Federal Criminal Code and Rules), 21 (drugs), 22, 26, 28, 31 (exclusive jurisdiction over Money and Finance investigations), 46, 49, and 50 (War and National Defense) statutes; giving them the broadest federal law enforcement jurisdiction of any agency. HSI has more than 8,500 Special Agents, making it the second largest federal law enforcement and criminal investigative agency within the United States government next to the FBI.

The change of names from ICE OI to HSI was announced in June 2010. Part of the reasoning behind the name change was to better describe the general activities of the agency, and to avoid the uninformed stigma that this agency only investigates immigration-related issues (ex. OI/HSI special agents duties were often mistaken by the public, other LE agencies and the media to mirror ERO agents/officers). HSI does have a public relations problem. Its the second largest investigatory agency, but the general public has never heard of it. ICE held it close to the belt and until recently, didn't publicly make the distinction as TSA does with Federal Air Marshals and CBP does with Border Patrol. In 2012, ICE and HSI have mandated a public distinction be made between both organizations. Most often news reports bury HSI's efforts as "immigrations agents" or as ICE efforts, and frequently Department of Justice and US Attorney's Office press releases of HSI-led investigations get spun up to sound like DOJ or FBI investigations that received assistance from local partners and ICE.

The name change to HSI better reflects that it is the U.S. Department of Homeland Security's primary investigative body, and as a result, its thought that someday it will be pulled out from under the ICE umbrella and stand independent under the DHS. An obscure fact is the original planned name before settling on ICE was the Bureau of Investigations and Criminal Enforcement, but the brothers at the FBI didn't approve and made their complaints heard.

Intelligence

Intelligence is a subcomponent of Homeland Security Investigations (HSI). The Office of Intelligence uses its Intelligence Research Specialists for the collection, analysis, and dissemination of strategic and tactical intelligence data for use by the operational elements of ICE and DHS. Consequently, the Office of Intelligence works closely with the Central Intelligence Agency, IRS the Federal Bureau of Investigation and U.S. Customs and Border Protection.

International Affairs

IA is a subcomponent of Homeland Security Investigations (HSI). The Office of International Affairs, with agents in over 60 locations around the world, represents DHS’ broadest footprint beyond US borders. ICE Attaché offices work with foreign counterparts to identify and combat transnational criminal organizations before they threaten the United States. IA also facilitates domestic HSI investigations.

Oh good, the CIA and FBI together at last... (and let's not forget the ICE/DHS network of detention facilities: Detention Facilities official front page- what is the HSI role for something like that applied to - somehow - non-immigrants?)

Official Site: http://www.ice.gov/about/offices/homeland-security-investigations/

The ICE Homeland Security Investigations (HSI) directorate is a critical asset in the ICE mission, responsible for investigating a wide range of domestic and international activities arising from the illegal movement of people and goods into, within and out of the United States.

HSI investigates immigration crime, human rights violations and human smuggling, smuggling of narcotics, weapons and other types of contraband, financial crimes, cybercrime and export enforcement issues. ICE special agents conduct investigations aimed at protecting critical infrastructure industries that are vulnerable to sabotage, attack or exploitation.

In addition to ICE criminal investigations, HSI oversees the agency's international affairs operations and intelligence functions. HSI consists of more than 10,000 employees, consisting of 6,700 special agents, who are assigned to more than 200 cities throughout the U.S. and 47 countries around the world.

Report suspicious activity. Complete our tip form.....

HSI conducts criminal investigations against terrorist and other criminal organizations who threaten national security. HSI combats worldwide criminal enterprises who seek to exploit America's legitimate trade, travel and financial systems and enforces America's customs and immigration laws at and beyond our nation's borders.

HSI comprises six key divisions:

-Domestic Operations

-Intelligence

-International Affairs

-Investigative Programs

-Mission Support

-National Intellectual Property Rights (IPR) Coordination Center

The official page for the HSI Special Agent in Charge Field Offices of which there are 26:

Homeland Security Investigations has 26 Special Agent in Charge (SAC) principal field offices throughout the United States. The SAC offices are responsible for the administration and management of all investigative and enforcement activities within the geographic boundaries of the office. The SACs develop, coordinate, and implement enforcement strategies to ensure conformance with national policies and procedures and to support national intelligence programs. SACs coordinate law enforcement activities with the highest level of Federal, state, and local governments, as well as intelligence organizations and international law enforcement entities. In addition, SACs supervise all administrative responsibilities assigned to the office and ensure a responsive Internal Controls Program is developed.

To efficiently manage their designated geographic regions, SAC offices maintain various subordinate field offices throughout their areas of responsibility, which support the enforcement mission. These subordinate field offices, Deputy Special Agents in Charge (DSAC), Assistant Special Agents in Charge (ASAC), Resident Agents in Charge (RAC) and Resident Agents (RA), are responsible for managing enforcement activities within the geographic boundaries of the office.

SAC Minneapolis/St. Paul

2901 Metro Drive, Suite 100

Bloomington, MN 55425

Main (952) 853-2940

Fax (612) 313-9045

If you search for 2901 Metro Drive Suite 100 that is the same office for other immigration, ICE & Homeland Security sub-offices.

These guys also have the completely insane National Intellectual Property Rights Coordination Center, a hearty reminder that the kafkaesque nature of what they call "intellectual property" combined with bureaucratic bloatware budget and an aggressively fascist private industry-friendly design, can truly combine to make one of the most awful, yet admittedly bold, authoritarian government logos of all time. Our Partner Agencies — National Intellectual Property Rights Coordination Center

intel-property-rights-center.png

It's almost enough to make you believe that swat teams could control all the memes they want, and even maybe the copy and paste commands too!

These are like a new branch of goons yet to be accounted for: HSI-Intel.

The ICE Homeland Security Investigations Intelligence Office (HSI-Intel) is a robust intelligence force that supports the enforcement needs of ICE’s executive leadership and operational field units.

Cutting edge technology, complex intelligence gathering tools, multifaceted investigative techniques and a high level of professionalism have enabled HSI-Intel to set the standard for federal law enforcement/intelligence agencies.

HSI-Intel also serves as home to the National Incident Response Unit (NIRU). This unit ensures that ICE is prepared to respond to national emergencies or critical events, including natural disasters, disease pandemics and terrorist attacks. NIRU plans for ICE’s continuity of operations before, during and after catastrophic incidents. During these incidents, NIRU serves as the agency’s central communications “nerve center,” coordinating the sharing of information between ICE components and other federal, state and local agencies. .....

HSI-Intel collects, analyzes and shares strategic and tactical data for use by DHS and ICE leadership and operational units. It also supports federal, state, local, tribal and international law enforcement partners.

HSI-Intel’s analysis and targeting information plays a vital role in supporting investigations related to illegal immigration, terrorism, weapons proliferation, war crimes, financial crimes, trade fraud, drug smuggling, human smuggling and trafficking, child sex tourism and other criminal activities.

I am sure they will figure out how all that drug money gets through the Federal Reserve Bank computer systems one of these days.

Organizationally parallel to ICE and the gestating HSI within it is the National Protection and Programs Directorate - Wikipedia. Has the Federal Protective Service now. A hodgepodge. Not the Center of the Action like HSI!

Oh true story... the KGB is now... wait for it... Federal Protective Service (Russia) - Wikipedia. Федеральная служба охраны, ФСО,

As far as I can tell, the following picture is not some satirical fan-boy art piece come to life. And those fonts.... christ! It looks like you can clearly see the 'investigations' part on there.

photo.jpeg

What about the Office of Investigations Special Response Team? Looks like we've found #8 and #10 so far. Both manilla and black color schemas.

Alright lets move this along & get these links out there.I found #9 for the Los Angeles set in Flickr user DFP2746 (plz forgive remixing a part of the images, you intellectual property fusion center types) Source: Homeland Security MRAP / DHS/ICE Special Response Team | Flickr - DFP2746

ice-investigation-srt-9.png

dhs-ice-srt.png

This is getting to be like Pokemon... my SRT trucks. Let me show you them...

First get the swag on eBay: specialresponseteam.JPG HOMELAND SECURITY ICE SRT SPECIAL RESPONSE PATCH | eBay

Press release from 2005 Katrina madness is nice: Department of Homeland Security Special Response Team Deploys to New Orleans Equipped with Zensah Tactical Gear

A– ICE Special Response Team (S.R.T.), an elite tactical unit attached to the Department of Homeland Security, deployed to New Orleans equipped with Zensah (http://www.zensah.com/tactical.html) tactical gear. By wearing Zensah™ moisture wicking tactical clothing, ICE special response team members receive a first line of defense against hazardous conditions found in the Gulf Coast areas affected by Hurricane Katrina.

ICE special response team members are in the affected areas to save lives, to protect lives, and to provide security to the recovery effort. ICE’s primary objectives are to support authorities in securing New Orleans and other affected communities and to provide security to federal rescue and recovery efforts.

....The ICE Special Response Team is an elite tactical team for the office of investigations under the Department of Homeland Security in Miami, Florida. Duties and responsibilities include search and arrests warrants, maritime interdiction, customs and immigration enforcement. For more information pleas visit http://www.ice.gov

Similar: Over 700 ICE Law Enforcement Personnel Were Sent to the Gulf Coast

MOAR GUNS: Tactical-Life.com » THE U.S. ICE MEN: The ICE Special Responders cometh bringing high-speed efficiency and low-drag force as required! "ICE also maintains five additional certified SRT units that are managed by ICE Detention and Operations." ... not sure if they mean 5 or 6 SRTs total. "the U.S. Customs Service evolved into a very progressive and highly successful interdiction and investigative agency. Due to the number of high-risk enforcement actions being executed on a regular basis, the U.S. Customs Service decided to establish a tactical unit called the WETT (Warrant Entry Tactical Team). In time, the U.S. Customs Service changed the name of its tactical team to the Special Response Team."

They're Hiring. Supervisory Border Patrol Agent (Special Response Team) - Homeland Security, Customs and Border Protection Job Posting

Buy training: Special Response Team Training 1: Overview & Objectives | Homeland Security Network USA newest backbone information source for First Responders

Gunfire a regular occurrence for ICE employees | California Watch. This has the following govt-produced pic, look how big that damn truck is. We can't see the apparent city-like (SAC?) insignia on the side or which number it has. It was at this Fort Benning GA training they blather about.

Another benefit of filling up society with needless paramilitary organizations is random accidental gunfire. Nice. "Roughly 80 ICE-involved shootings were unintentional and often involved agents dropping, cleaning or reaching for their guns, records show. The guns, in many cases, discharged in offices, government vehicles or during target practice. "

Special response teams prep for high risk situations at Ft. Benning - Nov 2011 press release ICE.gov

ice-special-training-ft-benning.png

City of Buffalo NY budget mentions a Major Award for it.

The confusing story of Homeland Security whistleblower Julia Davis ties into this I think. ie. see: Medal of Honor Held By The DHS PAGE 2

[ OKC Tangent. One other note -- In the Oklahoma City case I think Terry Nichols tried to tip off these Homeland Security types to a stash of explosives he'd obtained from FBI-friendly weapons dealer and Contra player Roger Moore. I don't have that info on hand here but it's around (notes on that ). It failed because some mafia guy snitched to the FBI -- the FBI has a pretty careful info cage around Nichols because of the informant-saturated nature of OKC he likes to talk about. This went down in like 2005. (Source of FBI Delay on Terry Nichols Explosives etc) So the idea is if the DOJ/FBI had a specific scheme such as OKC you could get around them through HSI. There's more to all of this, don't have the notes here, but there have been developments in recent weeks, search 'Jesse Trentadue'.. ]

201204120404.jpg

Check the ICE photos for some mad stuff. including saving the world from counterfeit NBA swag.

Conclusions? In any case it's good to know who the 'filler goons' are for NSSE campaigns of state-sponsored violence and insanity, of which 3.5 are scheduled for Chicago/Camp David, RNC & DNC this year, (along with the all important national sporting events), and ICE's new spawn HSI and the HSI SRT giant trucks will soon be a fixture at high profile gigs. There were weird Border Patrol Swat types at the 2009 G20 - See TC Indymedia Exclusive: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed - BORTAC is that team. And who knows what they might do with good ol' FEMA.

What to expect: HSI's avid effort to become a domestic Swiss army knife of police activity between IRS, CIA and FBI; another layer on the Joint Terrorism Task Force cake and a free-wheeling institution in its own right, combined with a few new flashy PR initiatives (a high profile bust of a little fish or 2 perhaps, etc) in order to carry out the planned 'branding' of HSI.

Perhaps we can just shut it down and use the borrowed debt 'money' we save to be less permanently indebted to the banker police state... borrowed money to build out echelons of mass suppression is always a grim spectacle. Imagine what we could have done with the wasted resources instead. Now we know which new goonsquad will get the biometrics data from Secure Communities.

And of course, who better to 'manage' the war on drugs than the organizational descendant of the 'cocaine cowboys' and the 1980s task forces which helped pass through planeload after planeload of cocaine? That era's keywords, Barry Seal, aviation fronts like Vortex, Southern Air Transport, Evergreen, Polar Air Cross and Air America (some still thriving), operations like AMADEUS, PEGASUS and WATCHTOWER, the quasi-privatized intelligence operations authorized under proclamations like Executive Order 12333 to facilitate the drugs-for-weapons smuggling... those were a few critical points of that era.

What awaits us next? How will HSI deal with the vast scale of financial corruption? What will they do? Who are they going to point the weapons at, and where are the trucks going? Chicago, Charlotte & Tampa... but first, LA, of course. For the immigrants.

Review: "Contagion": Minneapolis faces instant social collapse in latest Hollywood portrayal of martial law!

contagion-diseased.png

SPOILER ALERTS! -- Plagued man (lower left) staggers off bus at Lake & Lyndale; Paltrow croaks at Fairview University Medical Center; MDH painted as buffoons; Matt Damon defends saddest Minnesota XMas ever w/ shotgun & sweaters!

contagionfear.png

Snagged advance tickets to Steven Soderbergh's A-List disease disaster flick "Contagion." Rumpled but sagacious institutions going through the motions make for a dour rhythm & pacing. Overall it resembles a video news release designed to make us feel comfortable with lining up for shots at the FEMA/Red Cross center -- that's the whole catharsis at the end basically. Thanks to Cryptogon for the tip on this film!

But weirdly, a whole vision of wintertime midwest social collapse goes down in my general neighborhood -- Minneapolis to the Martial Law-lockdown Wisconsin border!

The Minneapolis Armory downtown is transformed into a pandemic doomcenter!

contagion-mpls-arena-medical.png

It's kind of an initiation into USNORTHCOM CONPLAN 2591 for Dummies: Line up You Crazed Minnesotans! It's NCIS: Team Bacteria, basically plodding dialogue rarely gets any humor catharsis.

It's too bad this stolid film could have been so sardonic – come on, with Fargo you've got a real Minnesota film. Even though few shots except say the downtown Armory actually appeared to be shot here. Still, the blue light & Thanksgiving-Xmas interval of complete doom bore the mark of a dark winter experience. Still this film needed humor -- they just couldn't put much in at all.

Quickly in Minnesota, panic and total social collapse sets in at martial food distribution ops and the grocery store.

contagion-mpls-foodfail.png contagion-groceryfail.png

Army trucks all over downtown in the morning hours:

contagion-mpls-martial-law.png contagion-groceryfail2.png

Martial law is setup at the Minnesota/Wisconsin border -- closed by the Wisconsin National Guard. Not filmed in Stillwater but should have been. I actually made a sketch of similar Wi/Mn border bridge freakout one time -- this film has it all!

contagion-wisconsin2.png

contagion-wisconsin1.png

contagion-MDH.png

Minnesota Department of Health (MDH) deserves far more credit than the obligatory "baffled public official" exposition scene. They're actually very good at tracing outbreaks -- E Coli strains in industrial food for example -- but get zero credit really. Except for a You-Betcha-Bubble-Suit-Next-to-Mass-Graves type moment.

contagion-massgraves.png

contagion-technocrats.png

No one is really portrayed solving things cleverly except Fishburne's people. Will this look kind of like a Duck-And-Cover propaganda film in 50 years? "Cheating" or taking risks bending the rules is peculiarly rewarded -- i.e scientist with Biohazard Level 3 lab still finds the virus growth medium after they try ordering him to shut down.

Jude Law is a pigeonholed as conspiracy disease blogger and you never ultimately see if he's a shady fear profiteer. By the end he's painted as vaguely pitching profitable homeopathic cure for a possible hedge fund payoff. The hedge fund turns him in to Homeland Security. Doesn't make sense. He's left filming silently people lining up at a Red Cross/FEMA arena as they peacefully await shots like lambs.

contagion-judelaw.png

Even as masked pillagers go through "suburban Minneapolis" in no sense are neighbors considered to be banding together in Minnesota -- though in China a whole village tries to hold the health scientist Cotillard hostage for vaccines.

It felt like there'd been battles over the script. Something about the way that the plots were stubbed out...

Adjuvants get a mention as needed to really get the immune response kicked into action. Delicious thimerosol win! (of course high levels of gross damaging adjuvants are needed because frequently vaccines are weak failsauce)

Just-in-time commercial inventory spells direct social fail: Surprise! I felt like the kind of preparation which local organization like the U of M's top notch Center for Infectious Disease Research & Policy which advises better supply chain strategies during dangerous pandemics. The pandemic supply chain fail basically leads straight to pandemonium in Minnesota.

There's no real sense of proper preparation -- a lack of creativity here. Actor Bryan Cranston as the military guy was pretty good.

Spoiler deets-

-- the crucial clue on Paltrow's camera -- Damon finally notices month later. Seriously they never found this earlier?

contagion-camerafail.png

contagion-camerafail2.png

-- if they point out that fatality level from malnutrition is variable to nutrition, they could have promoted vitamin D but didn't

-- You get vaccinated == Arm Band seemed like prescripting or an introduction, as well as catharsis in plot!contagion-vaccines.png

-- At least no one gets chipped (altho vaccine fans will point out you can hide unique signatures in vaccine fluid)

-- No real 'mitigating' approach - be it neighborhood security radio or taking more vitamins -- no one is really creative outside of the government

-- Dr. Sanjay Gupta - CNN, NBC/Comcast KARE 11 are the media snippets. Gupta mediates the Fishburne/Law throwdown between CDC & Conspiracybloggers.

-- Chinese cooks hug western executive while greasy with pig guts fresh from the Chinese interior.

-- People coughing in the theater are scary!

-- Big FEMA Red Cross polite line of vaccine recipients is the catharsis "landing" basically

contagion-arena.png

I didn't bother to stick around and look at the thank-yous to see who was involved in production. The way that it feels like you're mainly plodding, tumbling through the CDC's cogs reminded me of another similar film The Next Three Days wherein Russell Crowe triggers off similar National Security machinations. Hell the new Transformers movie has the military as a major character collectively. It just doesn't make the stories move along to cover all these institutions and their fictionally presented wonderful operations.

This site is promoted on the trailer -- it doesn't even mention Minneapolis after all this trouble!

takepart-contagion.png

Matt Damon gits a shotgun which weirdly wasn't looted from his neighbors -- while the food was.

contagion-guns.png

Chicago gets the martial law treatment like the FEMA Region V headquarters it is.

contagion-chicago-femaregion.png contagion-martiallaw.png

Homeland Security Guy always seems like a douche but He Means Well.

contagion-homelandsecurity.png

Dimitri Martin handles yr viruses

contagion-level4.png

I think this scene was cut? Or was I not paying attention.

contagion-testimony.png

Obligatory red blooming map

contagion-obligatory-red-map.png

That about covers it. I always wash my hands and try to avoid touching my face. Minnesota is kind-of used to this stuff so I rather resent we are now portrayed as the exemplars of public panic!

After London riots: Internets attention turns to Pentagon's CONPLAN 3502 - domestic military riot control & martial law style enforcement grabs attention all over Internets! Hope yet for NSSE & secret military planning awareness :)

Earlier :) Nov 20 2010: TC Indymedia Exclusive: Secret 'Trigger' & blueprint for emergency domestic military crackdown plan revealed | HongPong.com

Moar Recently: Reacting to London riots - A Little Truth about America's situation Emerged! Marc Ambinder (marcambinder) on Twitter

Screen shot 2011-08-15 at 4.22.16 AM.png

A few lateral notes about the military's secret plans for civil unrest in America...

(a helicopter went overhead right as I typed that :-D -- pretty sure it was medical tho :)Screen shot 2011-08-15 at 4.24.41 AM.png

Here's an interesting twist in the last few days — quite an awesome one! In response to the London riots, the Atlantic's Marc Ambinder tweeted about how the US military would apply USNORTHCOM CONPLAN 3501 & 3502 to suppress any insurrection in the United States. It drew a flurry of tweets including Michelle Norris from NPR -- all curious about this CONPLAN situation.

Atlantic's John Hudson did a followup post expanding on the CONPLAN 3501 & 3502 military contingency plans The U.S. Military's Plan for London-Like Riots - Global - The Atlantic Wire. As always, it's nice to get indirectly referred to as a "conspiracy theorist" adjacent to the very documentation that ya dug up and posted to internets -- not sourced of course :-D

From there further writings appeared including Russia Today , the UK Daily Mail & a piece on Infowars by Kurt Nimmo. Memorable passage:)

More information can be found here. IndyMedia provided extrensive coverage, not that the New York Times or the Washington Post noticed. The establishment press was uniformly silent.

Indeed WaPo & NYT aren't too concerned but at least I got someone's attention. Also a nice writeup from FederalJack / TheIntelHub crew: Martial Law: Corporate Media Hints At Military Plans To Take On The American People During Domestic Civil Unrest

These posts in turn got re-posted all over the Internets, from NWO/martial law to prepper and other activist fora. Interesting threads or mere stubs, the word's getting around about this major element of the military's overall plan - as well as the basis for the 2012 NSSEs including G8/NATO in Chicago and the 2012 RNC & DNC.

This all spawned from the 2008 Republican National Convention & its shady NORTHCOM dimension. I wrote the story back in November laying out all the new details on the CONPLAN situation which I found on a US Army Corps of Engineers webserver. At the time it got picked up by a few forums, some excellent sites including cryptome.org, but it didn't really hit a wide audience. Perhaps that was good, since the US Army Corps left the files up all through December.

As for the disappearing files I noticed in all this since November. They only finally locked down that USACE file server after that ghastly spike in news about the Mass Die-Offs around January 2011 went down. People on forums suggested that the National Level Exercise 2011 New Madrid Seismic Zone earthquake test operation could be linked to the die-offs (as in a worsening fault line would give off toxic gas killing birds in Missouri &etc). Then the files disappeared from public access at those URLS....

Obviously the other major trend has been increasing unrest around the world as food prices spiral and the debt slavery/austerity budget agenda absorbs all political power. Entire nations' sovereign debt problems are now destabilizing, as the US has remained relatively quiet in most respects.

With the increasing systemic instability – and the political class' abject failure to regulate and de-escalate the enormous financial criminal systems and the assorted chaos in areas like real estate & the war on drugs, high-frequency trading, fraudulent securitization – the expectation of bigger backstops has been increasing... so it's important everyone finds out!

How much longer till the National Guard is called out?In such circumstances it's far better for everyone caught in the middle to have a general handle on the CONPLAN type background information. I really hoped that sharing the info would serve as an advance warning – a Paul Revere kind of message.

Now many many more people know about CONPLAN 3502. Makes me happy :) Just for kicks I am posting a huge list. Most of it's crossposts, but there are a few lively forum threads and really all of these sites appear to be "keeping tabs" in their own unique ways. Even if I would not agree with all of their content (even maniacs like the Klan noticed the story :-[ ), I hope all these people can respect I helped finally alert them to the keystone chunks of the most alarming layers in the scheme. Even people with detestable political views deserve to know about this kind of secret planning for military control!

That's some Real America going on right there.... that's how we roll :-D

************

Also briefly - something about CONPLAN 5029 for North Korea Collapse / Emergency US coordination with China leaked out??? CONPLAN 5029 cedes controt to U.S. and China in N.Korean emergency : North Korea : Home - from a collectively owned Korean newspaper?? Interesting peeps at the Hankyoreh .

Also interesting from 2006 - CONPLAN 8022 - Daily Times - Leading News Resource of Pakistan - ‘US had designs on Iran before Iraq invasion’

Running a quick google search for "CONPLAN" filtered to the last week or so (Aug 15 to Aug 8) turns up dozens of posts & crossposts.

America’s response to London riots — RT <- Russia Today!

With civil unrest spreading into the western world, the US is readying what to do should mass riots break out state-side.

What exactly is the official plan of action should the government need to step in and squash demonstrators? Send the military after minorities.

Marc Ambinder, a White House correspondent at The National Journal, writes that the armed forces have plans should widespread riots infiltrate America.

“If what happened in London ever happened in the US, the military has plans – CONPLAN 3501 and 3502 – to suppress the insurrection,” writes Ambinder. The instructions contained with the CONPLAN guidelines are believed to be initiatives that the US can enact during times of domestic disturbances.

According to GlobalSecurity.org, CONPLAN 3502 is what the military can put into play if state and local authorities are subjected to mass rioting. They say that the instructions in CONPLAN 3502 outline that "Tasks performed by military forces may include joint patrolling with law enforcement officers; securing key buildings, memorials, intersections and bridges; and acting as a quick reaction force."

LONDON RIOTS: How US would deal with UK riots - send in the Army | Mail Online <- the Daily Mail used the image from the presentation I posted in November :-D

How The U.S. will deal With U.K. Style Riots « slow33

American Preppers Network • View topic - "CONPLAN 3501 AND 3502"

Is CONPLAN 3501 and 3502 part of demand destruction? - Yahoo! Answers

How long before we see CONPLAN installed in the US? - Yahoo! Answers

WHAT THE HECK IS CONPLAN 3501 and 3502????" - SodaHead

U.S. Plan for London Like Riots - Use of Military - CONPLAN 2502 | WHAT REALLY HAPPENED

CONPLAN 3501 and 3502 -US Plans In Case of Mass Social Unrest/Riots - Anonymous has sort-of noticed oh good

Screen shot 2011-08-15 at 4.37.16 AM.png America’s response to London riots - Inteltoday RT repost

IS THE UNCONSTITUTIONALITY AND HORROR OF MARTIAL LAW COMING..NO WAY..HIAL MARY..! - TCUnation - commentary "SATAN IS A LIAR...!"

U.S. Plan for London Like Riots – Use of Military – CONPLAN 2502 | Dprogram.net

Sherrie Questioning All: U.S. Plan for London Like Riots - Use of Military - CONPLAN 2502

America’s response to London riots « Evil of indifference

Corporate Media Puzzled by U.S. Martial Law Plans in Wake of Brit Riots | The Line in the Sand

A link to USARNORTH conplan 3501: martial law in case of "emergency" in order to so called " defend - 12160

Martial Law in America – Conplan 3502 Exposed – NORTHCOM FEMA RNC G20 Civil Disturbance | law- article directory

CONPLAN « Full Metal Cynic < - Angry monkey :)

New World Order – One world government - The U.S. Military’s Plan for London-Like Riots

Martial Law in America: No Longer Just a Possibility!( Videos)

U.S. Plan for London Like Riots - Use of Military - CONPLAN 2502 : Truth is Contagious

The U.S. Military’s Plan for London-Like Riots | War On You: Breaking Alternative News

The U.S. Military’s Plan for London-Like Riots | people for freedom

The U.S. Military’s Plan for London-Like Riots | Set You Free News

Big Education Ape: The U.S. Military's Plan for London-Like Riots - Global - The Atlantic Wire

The New World Order Update: Corporate Media Puzzled by U.S. Martial Law Plans in Wake of Brit Riots

Posted earlier in May with my video -- SO AWESOME. I AM Buddy, The BUDDHA From Mississippi ™: Martial Law in America - Conplan 3502 Exposed - NORTHCOM FEMA RNC G20 Civil Disturbance <- these guys had a truly head-turning piece of political art -- oh Man What a LOL :-D via here. Complete w mean Blackwater black helicopter

Martial Law in America - Conplan 3502 Exposed-1.jpg

Project Wake-Up Call: CONPLAN 3501/3502 < - zesty site :)

The U.S. Military’s Plan for London-Like Riots | Truth Is Scary <- JFK / crop circles / pyramids - notes on the multiverse

Corporate Media Puzzled by U.S. Martial Law Plans in Wake of Brit Riots | PEOPLEUNLIKEUS

America’s response to London riots | Before It's News

The U.S. Military's Plan for London-Like Riots, page 1 - AboveTopSecret forum

The U.S. Military’s Plan for London-Like Riots |

The U.S. Military’s Plan for London-Like Riots « CRISISBOOM - mm silver

The U.S. Military's Plan for London-Like Riots | Pacific Rim Trading International - related to above? drupalized :)

PowerSwitch :: View topic - The U.S. Military's Plan for London-Like Riots UK peakers

Watrcher Meetup zodiac peeps? • View topic - The Mili tary's Plan for Ri ots

The U.S. Military’s Plan for London-Like Riots | RevolutionRadio.org

US Martial Law Plans | Before It's News

U.S. MARTIAL LAW PLANS IN THE WAKE OF U.K. RIOTS « EPHEMERIS 360° – IMPERIAL TWILIGHT

The U.S. Military's Plan for London-Like Riots (The Unhived Mind III) My favorite response presented by the official voice of TheUnhivedMind (the definitive forum for the deets vs weird Knights of Malta / Vatican intrigues!) [alt link]

Here you go folks they're telling you they're ready to bring in Martial Law in the U.S. very quickly once the riots are kicked off by The Worshipful Company of Fuellers and The Worshipful Company of Security Professionals over there through the Central Intelligence Agency, British Secret Intelligence Service and the Senior Executive Service. In the U.S. its not the police preparing the U.K. style riots, its the MILITARY, smell the coffee folks. All under The Pentagon controlled by the Fuellers.

This pertains to the interesting British Livery Company system of control for the City of London which goes back centuries before MI-5 and MI-6.

infinite unknown: The US Military’s Plan for London-Like Riots: "It almost appears they want us to revolt so they can impose martial law. The injustice I see everywhere makes it difficult for me to remember this is America. All our civil rights are gone. Habeas Corpus, a right of man for well over 800 years is gone."

How U.S. would deal with UK-style riots - qwstnevrythg.com

The U.S. Military’s Plan for London-Like Riots « The Daily Attack - what is this site??

The U.S. Military's Plan for London-Like Riots - USA Hitman Forum - auto linked: The Army's Bold Plan to Turn Soldiers Into Telepaths :-D

The U.S./Canadian Military's Plan for London-Like Riots - the Canadian NORTHCOM dimension catches notice!

NewAmericaNow: The U.S. Military's Plan for London-Like Riots

The U.S. Military's Plan for London-Like Riots | Con Games

Corporate Media Puzzled by U.S. Martial Law Plans in Wake of Brit Riots | FirinneMedia.Com

The U.S. Military's Plan for London-Like Riots - Lunatic outpost chatty thread

U.S. Plan for London like Riots - Malaysia forum thoughtful LOLcat response heh

worship2_dees-jpg.jpegMartial Law: Corporate Media Hints At Military Plans To Take On The American People During Domestic Civil Unrest | Truth Frequency News - you have got to dig that clip art they threw in :-D the sp00ky eyes :-D

Martial Law: Corporate Media Hints At Military Plans - Survivalist Forum - they are interested! Quite interested!

The U.S. Military’s Plan for London-Like Riots | Old-Thinker News

ALIPAC Forums-viewtopic-The U.S. Military’s Plan for London-Like Riots

**Urgent** Corporate Media Puzzled by U.S. Martial Law Plans in Wake of Brit Riots - The Apricity Forum: Cultural & Ethnic European Preservation <- um that is a pretty sketchy sounding forum :(

The Kick Them All Out Project - Corporate Media Puzzled by U.S. Martial Law Plans in Wake of Brit Riots

operation Garden plot « The Burning Platform

America’s response to London riots | End the Lie - Independent News

The U.S. Military’s Plan for London-Like Riots - 12160

mOole - Развлекательный блого-новостной портал - the Russians are advised of the CONPLAN! They posted my image :)

Revealed: How U.S. would deal with UK-style riots... by sending the Army to areas with 'large numbers of minority groups' -- Puppet Masters -- Sott.net

MARTIAL LAW « EPHEMERIS 360° – IMPERIAL TWILIGHT

The Oil Age | Peak Oil | LATOC • The U.S. Military's Plan for London-Like Riots : Breaking News

US Military Plans for London-Like Riots - UNSKKKK Forum - Oh great the klan X-(

Hackinc2000.com » The U.S. Military’s Plan for London-Like Riots

readin & fightin • The U.S. Military's Plan for London-Like Riots

CriticalUnity.org | Corporate Media Puzzled by U.S. Martial Law Plans in Wake of Brit Riots

Action is my duty, Reward is not my concern - The U.S. Military's Plan for London-Like Riots (The Atlantic)

Media Reveals Military Martial Law Plans To Deal With American Civic Unrest - alexanderhiggins blog

Command Structure - crossposts emerge!

Lucianne.com News Forum - Thread - frickin Lucianne Goldberg's forum!

Will New Madrid Earthquake Happen Soon? - Topix

The American white people are more concerned about mistreating the Black once-slave of America than America is concerned with any nation on earth that is attacking her out-lying posts.(The U.S. Military’s Plan for London-Like Riots) – This weblog is for sounding DIVINE TRUTH in the ears of the dead! - I think this is a Nation of Islam blog.

Revealed: How U.S. would deal with UK-style riots… by sending the Army to areas with ‘large numbers of minority groups’ | - fonky site with crop circles & weirdNews

The U.S. Military’s Plan for London-Like Riots | Brian Brown's Official Website

RBN radio : Corporate Media Puzzled by U.S. Martial Law Plans in Wake of Brit Riots | Republic Broadcasting Network

Operation Garden Plot, Insurrection and CONPLAN 3502 – Hayden’s Note on Katrina Attached - Truth is Treason:

It is my belief that Operation Garden Plot and Noble Eagle-like activation was witnessed in New Orleans during Hurricane Katrina. I was a police officer there at the time and it fulfilled the plan to a T. Joint patrols with civil authorities, checkpoints for major arteries in and out of the city, soldiers and Humvees stationed at major intersections and bridges, assistance in imposing an unlawful curfew against all citizens, gun confiscation, and even business checks. These “patrols” involved the use of thermal image cameras mounted on the Humvees, looking for warm bodies moving through the darkness and debris, riding with various SWAT teams and responding to gun fights, looting and even conducting traffic stops and simple drug enforcement.

Conplan 3502 Exposed - SECRET US PLANS FOR DOMESTIC MILITARY CRACKDOWN

Secret Plans for Domestic Military Crackdown Published by Mistake - earlier thread - really funny from threepercenters

http://www.noonehastodietomorrow.com/agenda/policestate/2973-2973

Finally one other thing Civilian Law Enforcement – Military Cooperation (CLEMCC) - the International Association of Chiefs of Police is a nasty little trade association run from and funded by the heart of the military industrial complex in Virginia - they appear constantly as a major Pusher in matters like this. My friend Kaye at Axxiom for Liberty is constantly bumping into IACP stuff.

******

also: http://www.benzinga.com/11/08/1853121/operation-garden-plot-insurrection...

weird mirror / mill? http://dailyme.com/story/2011081100004236/operation-garden-plot-insurrec...

also creepy stuff like this seems to be remixing it all together - a spewky tale of foreign troops and FEMA camp roundups. Military Insider Reveals Martial Law Plans ► Martial Law and FEMA Camps ► Part 1 - YouTube "because American soldiers are not going to take Americans to concentration camps".... hmmm. also *ALERT* FEMA NLE 2011 The Destruction of America Explained - YouTube etc.

Anyway we will leave it there for now -- as for Martial Law -- I warned you guys OK?!

Friday Evening: It's time to expose teh secret ops live on radio! Friday November 19th on AxXiom for Liberty LIVE-CONPLAN Secret Ops exposed!

 

Hey everyone, the big story is finally getting released. This should clarify a lot of confusing dimensions to what's really been going on. And a huge relief to deal with - after months of work!

It's a messy one - but really important. Tune into RuleOfLawRadio.com tonite, Fri Nov 19th  -- if I have ever done ya a favor - or even written something which amused you - please return it by helping to spread this story to anyone, anyone affected by the Gulf disaster, concerns about martial law, natural disasters, FEMA, Northcom, Homeland Security, the G20, RNC, DNC2012 (!) etc. More-or-less I tripped over the core of the damn thing so here's what the real deal is.

The story will be here on HongPong.com, TC.Indymedia.org, and ExceptionMag.com. Or tune into AM stations around the Heartland, where they ought to hear about it....

******

Friday November 19th on AxXiom for Liberty LIVE-CONPLAN Secret Ops exposed!

One of the best independent researchers I know will be unveiling for the first time the results of some very interesting research.

Dan Feidt is the go to guy when it comes to Fusion CentersThe Military Industrial Complex, anything intel, info ops or top secret government documents.   He is also a boots on the ground activist and citizen reporter  and can tell you just how to deal with surly legislators, corrupt officials and the government spies that think that every gathering of citizens is an angry mob on the verge of an uprising.

He has been working on this story since April and has been driving me crazy with hints of what it is all about.  I have just now gotten a sneak peek of the information and will just say that it was worth the wait!

You won’t want to miss this show!

In brief, Dan has found “new military documents really maps out the latest revisions of how the system works when the 'military hits American streets'. It's about FEMA, Northcom, how they plan out domestic emergencies and crackdowns like the RNC/G20 - hard proof of new revisions to secret military plans they've run since the '68 conventions & Kent State.”

On Friday Nov 19th Dan will post the links for these eye-opening documents that we ask you to hit them quick, download and share because once this story is out those docs will be gone!  

 

The evidence will be posted shortly before the show at 5:30 pm at these locations.

 www.tc.indymedia.org

www.hongpong.com

 www.exceptionmag.com

"A foolish faith in authority is the worst enemy of truth." 
-- Albert Einstein, letter to a friend, 1901

AxXiom for Liberty http://axiomamuse.wordpress.com/

RadioFreeOklahoma.wordpress.com
www.RadioFreeOklahoma.net Wednesdays 8-10 CT

Syndicate content